How To Write A Book On The Internet Security
|
|
- Osborn Webster
- 3 years ago
- Views:
Transcription
1 Datum Bedrijfszekerheid in ketens Risk Towards Trustworthy ICT Service Chains Control Assurance Integrated Assurance framework for ICT enabled service chains Drs Y.W. (Ype) van Wijk RE RA Rijksuniversiteit Groningen Business & ICT IT auditing 24 november 2011
2 Datum Agenda Towards Trustworthy ICT service chains (TTISC project) Bedrijfszekerheid en trends in ketens Content versus Delivery networks Assurance guidelines The atomic approach for controls in service chains Samenvatting en conclusie
3 Datum Towards Trustworthy ICT Service Chains Innovatie samenwerkingsverband ICT services chains Chain Governance, SaaS, SOA, ICT, IT Audit Risk Control - Assurance Bedrijfszekerheid in ketenautomatisering Framework Assurance Leading Indicators Rijksuniversiteit Groningen Bestuurlijke Informatica Drs Y.W. van Wijk RE RA PWC Accountant en IT consulting Nedlloyd operational audit Euronext Amvest BV Cobalus BV Rijksuniversiteit Groningen
4 Datum Bedrijfszekerheid in ICT ketens
5 Bedrijfszekerheid en ICT ketens service Datum service request service request Consument service Enabler (certificaat) Techniek ICT Netwerk - Architectuur Service leverancier Bedrijfszekerheid 44,4 mlrd Inkomstenbelasting Miljoenennota 2010
6 Datum Trends ICT ketens van Applicaties naar ketens van gekoppelde externe service netwerken van applicaties (linkedin, maps) SaaS en Cloud computing als distributeur Toename afhankelijkheid Nieuwe risico s en bedreigingen Applicatie leverancier afhankelijk vertrouwen leveranciers van leveranciers, ad infinitum. Need for assurance (e-government, e-business) Objectieve methode assurance Security, availability, quality of service (QoS) Assurance over totale keten.
7 Datum Service chain Assurance approach Business content risk Risk Control Assurance Delivery technical risk Risico in service ketens content networks - business inhoud network controls delivery networks - technische ICT control Generalisatie en conceptualisatie Integrated Assurance Framework for ICT enabled service chains
8 Datum Standards, Guidelines, Frameworks, Best Practices, Architecture theory s Standards ISO series ENISA Guidelines COBIT IT control objectives for cloud computing ITAF (IT Assurance Framework) Val IT Risk IT IEEE Practitioners research TEXO SAP research Project Master Chain governance Scientific research Organization theory Technical ICT research Architecture Audit theory Operations research Accountancy Architectures SOA SaaS Cloud computing Assurance Conceptualization in service chains?
9 Datum Assurance Back to Basic.
10 Datum Het basis Atoom van de service chain Content network Service Chain service Content Network request A B C Add value service request Risk Control Enactment Enforcement Delivery Network Delivery network Service Chain Risk Control Assurance
11 Datum Service chain propagation in content and delivery networks Content Network Service Chain Propagation Backward Content network Front Chain propagation Risk Delivery network Service Chain Propagation Delivery Network Service Chain Propagation Chain propagation Risk
12 Level business content assurance network Datum Enactment Organisatie Client Skin Organisatie Organisatie 3. Service Chain Assurance inkoop = service + service.. Enforcement Risk Control Assurance 1. INTRA-organisatie risk-control-assurance 2. INTER-organisatie risk-control-assurance
13 Level Technical delivery assurance network Datum Enactment Mobile network Client ISP TNT Enforcement Risk Control Assurance Security Vulnerability, confidentiality, Integrity, Authentication Quality of service (QoS) Bandwidth, Delay, Jitter, Round-trip time Availability Downtime, Mean-time between failure, Self healing properties
14 Datum Consequences for Architecture Service chain architecture Split content and delivery for chains Develop content assurance chain Develop delivery assurance chain Take care of proper enactment in the chain Agree on service chain enforcement Integrate on specific assurance indicators Service Based Auditing Institutionalize audit and dissemination assurance
15 Datum Conclusions Assurance is a primary condition for services business Assurance in service chains must add predictive value For Architecture it is important to integrate a-priori the leading indicators content and delivery network assurance Integrating assurance indicators in the design phase of service oriented architecture can support content and delivery assurance. Assurance by professional independent party opinion can be fundamental for trustworthy services in chains
16 Datum Towards Trustworthy ICT Service Chains Risk Control Dank voor uw aandacht Assurance Drs Y.W. (Ype) van Wijk RE RA Rijksuniversiteit Groningen Business & ICT IT auditing
17 Practitioners References Datum Standards ISO ENISA Guidelines COBIT IT control objectives for cloud computing ITAF (IT Assurance Framework) Val IT Risk IT Practitioners research TEXO Governance framework (SAP research) Project Master
Architectuur hulpmiddelen TechnoVision & CORA. Maarten Engels Nieuwegein, 9 februari 2012
Architectuur hulpmiddelen TechnoVision & CORA Maarten Engels Nieuwegein, 9 februari 2012 AGENDA Hulpmiddel 1: TechnoVision Hulpmiddel 2: Common Reference Architecture Q&A Hulpmiddel 1: TechnoVision 4
More information+ Even voorstellen Barry Derksen, Directeur BITTI B.V., Bedrijf met 10 toppers op : benchmark, advies, audit en interim/ project management
Business & IT alignment ABC...van WORST practices! Barry Derksen + Even voorstellen Barry Derksen, Directeur BITTI B.V., Bedrijf met 10 toppers op : benchmark, advies, audit en interim/ project management
More informationMaintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper
Maintaining Herd Communication - Standards Used In IT And Cyber Security Laura Kuiper So what is Cyber Security? According to ITU-T X.1205 Cybersecurity is the collection of tools, policies, security concepts,
More informationF5 NETWORKS Good, Better & Best. Patrick Heirwegh Channel Manager p.heirwegh@f5.com +32 468 18 51 19
F5 NETWORKS Good, Better & Best Patrick Heirwegh Channel Manager p.heirwegh@f5.com +32 468 18 51 19 The F5 Advantage Security Enterprise Users $ Customers Attacker ICSA Certified ACL s DoS Mitigation IP
More informationFINANCIAL SHARED SERVICES
FINANCIAL SHARED SERVICES Arie Geneugelijk, John Vervloet & Djimmy Zeijpveld 9-3-2016 Agenda Waarom bent u hier? Praktijkvoorbeeld Exact: Transitie naar shared service center Demonstratie Vragen? Waarom
More informationHet Secure Datacenter
Het Secure Datacenter If trust and reliability matters Michiel Steltman CTO Siennax Drivers voor IT Security Financiële aansprakelijkheid Sox, Basel II Persoonlijke aansprakelijkheid van managers Operationele
More informationVan risico analyse naar security plan
Van risico analyse naar security plan. Small step (for man) or Giant leap (for mankind) Aart Bitter 9 september 2009 Aart.Bitter@planet.nl About me Technische Informatica & Computerkunde 1991 ITIL Service
More informationISO 27001:2005 & ISO 9001:2008
ISO 27001:2005 & ISO 9001:2008 September 2011 1 Main Topics SFA ISO Certificates ISO 27000 Series used in the organization ISO 27001:2005 - Benefits for the organization ISO 9001:2008 - Benefits for the
More informationCloud. Transformatie. Cases.
Cloud. Transformatie. Cases. Dé cloud bestaat niet. maakt cloud concreet 2 IT Transformatie. Cloud? De vraag is niet of we gaan, maar wanneer en hoe #sogetidoethet Matthias Radder Cloud Consultant 3 In
More informationPlatform voor Informatiebeveiliging IB Governance en management dashboards
Platform voor Informatiebeveiliging IB Governance en management dashboards Johan Bakker MSc CISSP ISSAP Principal Policy Advisor KPN Corporate Center Information Security Governance Agenda Drivers voor
More informationIntroductie Agilos Enterprise Warehouse View The Audit-Data Warehouse: a data refinery Controls Warehouses Solution Warehouses
Source: www.olifantenpaadjes.nl/ Agenda 1 2 3 Introductie Agilos Enterprise Warehouse View The Audit-Data Warehouse: a data refinery 4 Controls Warehouses 4 Solution Warehouses -1- -2-1 Introductie Agilos
More informationISACA Roundtable. Cobit and Grab@Pizza 7 september 2015
1 ISACA Roundtable 7 september 2015 ISACA Roundtable Cobit and Grab@Pizza 7 september 2015 2015 KPN Corporate Market B.V. ISACA, is a registered trademark of the Information Systems Audit and Control Association
More informationMarket Intelligence & Research Services. CRM Trends Overview. MarketCap International BV Januari 2011
Market Intelligence & Research Services CRM Trends Overview MarketCap International BV Januari 2011 Index 1. CRM Trends generiek 2. CRM & IT 3. CRM in Nederland 2011 2 Index 1. CRM Trends generiek 2. CRM
More informationInformation Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
More informationE-Commerce met Microsoft
Webplatform & klantmanagement E-Commerce met Microsoft Verander uw Web-site naar een succesvol business platform Nico Copier Enterprise Technology Architect nico.copier@microsoft.com Microsoft Agenda Trends
More informationT h e N e x t G e n e r a t i o n of C o n s u m e r i z a t i o n KIXS. Leading Edge Forum Study Tour 20-25 October 2013
T h e N e x t G e n e r a t i o n of C o n s u m e r i z a t i o n Teus ir. van T. der Plaat der Plaat KIXS Leading Edge Forum Study Tour 20-25 October 2013 November 2013 De reis Inleiding S-curve End
More informationPinkRoccade Offshore Facilities Optimizing the Software Development Chain. PROF proposition. neral presentation
Optimizing the Software Development Chain PROF proposition neral presentation OF PinkRoccade Offshore: Near Offshore future Facilities Gartner: Offshore is no longer a strategic advantage it is a competitive
More informationDe rol van requirements bij global development
De rol van requirements bij global development 19 & 25 november 2008 Rini van Solingen Requirements zijn een noodzakelijk kwaad Immers, als wij elkaars gedachten konden lezen hadden we geen requirements
More informationHoe ontwerp en realiseer je een digitale wasstraat?
Hoe ontwerp en realiseer je een digitale wasstraat? Introductie Context Basis Browsing Hosting Conclusie & Contact Wie zijn wij Jeroen van der Meer In IT sinds 1984 CTO Systems programming Datacenter design
More informationInformation Security Governance
Information Security Governance Aart Bitter Aart.Bitter@information-security-governance.com Agenda Governance & Compliance Information Security Governance Aanpak om information security governance in organisaties
More informationCisco Data Center and Virtualisation Strategy. Marc Samsom
Cisco Data Center and Virtualisation Strategy Marc Samsom I'm not after servers. I'm after virtualization, where you don't know where your processors are, your information's stored, the application resides..
More informationSecurity and privacy standardization for the SME community
Security and privacy standardization for the SME community NLO meeting, Athens, March 4th 2015 European Union Agency for Network and Information Security www.enisa.europa.eu PROJECT CONTEXT European Union
More informationInformatiebeveiliging volgens ISO/IEC 27001:2013
Informatiebeveiliging volgens ISO/IEC 27001:2013 Dave Hagenaars, directeur BSI Group Nederland Copyright 2012 BSI. All rights reserved. Inhoud Wie zijn wij? Waarom informatiebeveiliging? Wat is de relevantie
More informationVisie op Hosted Services: Cloud Computing. Michel N guettia Business Lead Server
Visie op Hosted Services: Cloud Computing Michel N guettia Business Lead Server Agenda De Strategie Microsoft Cloud Partner Opportunity Ondertussen, de 5e Generatie Computing Cloud SOA Web Client-Server
More information#BMIT. Welcome. Seminar Business Continuity
#BMIT Welcome Seminar Business Continuity Smart Business Strategies Business Meets IT - Agenda 9.30: Market Research: William Visterin, Smart Business Strategies 10.00: Chris De Blende, PwC Business
More informationProcesses, services and business agility
Processes, services and business agility prof. dr. Wilfried Lemahieu K.U.Leuven Faculty of Business and Economics Department of Decision sciences and Information Management wilfried.lemahieu@econ.kuleuven.be
More informationHow To Run A Brainresearch Biobank
In 7 stappennaareentotale biobank oplossing Erik Steinfelder Labautomation 13 april, Hoevelaken In 7 stappen naar een totale biobank oplossing 1. Defineer het huidige proces 2. Vorm een project team 3.
More informationThe Netherlands: ICT R&D and participation to FP7
The Netherlands: ICT R&D and participation to FP7 Research & Development expenditure in ICT In 2011, public support for ICT R&D (ICT GBAORD) in the Netherlands was 6.6% of total public funding for R&D,
More informationWhat Is KAURI?
KAURI Mission (Articles of Association) De vereniging heeft tot doel een platform, kenniscentrum en lerend netwerk te zijn van mensen uit het bedrijfsleven, maatschappelijke organisaties en instellingen,
More informationExecutive's Guide to
Executive's Guide to IT Governance Improving Systems Processes with Service Management, COBIT, and ITIL ROBERT R. MOELLER WILEY John Wiley & Sons, Inc. Contents Preface xiii PART I: IT GOVERNANCE CONCEPTS
More information15 JAAR VOOROP IN ICT SECURITY
NEXT GENERATION MOTIV BIEDT WEERBAARHEID EN MONITORING VOOR UW GEBRUIKERSNETWERK OF DATACENTER CHALLENGES CHALLENGES MALWARE FOUND CHALLENGES BOTNETS ATTACK CHALLENGES GEBRUIK VAN DIVERSE APPLICATIES CHALLENGES
More informationA view on governance. SharePoint Kennisdelingsdag. Nick Stuifbergen, consultant Nickstu@microsoft.com. 28 January 2011
A view on governance SharePoint Kennisdelingsdag Nick Stuifbergen, consultant Nickstu@microsoft.com 28 January 2011 Agenda Waar zie je de risico s A view on governance SharePoint landscape SharePoint life
More informationCLOUD SECURITY THROUGH COBIT, ISO 27001 ISMS CONTROLS, ASSURANCE AND COMPLIANCE
CLOUD SECURITY THROUGH COBIT, ISO 27001 ISMS CONTROLS, ASSURANCE AND COMPLIANCE Indranil Mukherjee Singapore ISC Pte Ltd Session ID: CLD T02 Session Classification: Intermediate Cloud Computing from a
More informationPower to Innovate. Luc Verbist CIO De Persgroep 22/1/2015
Power to Innovate Luc Verbist CIO De Persgroep 22/1/2015 Innovatie Business modellen wijzigden gestaag. Nieuwe technologie ligt aan de basis van erg disruptieve wijzigingen. Muziek Foto Media Taxi Banken
More informationIT Audit in the Cloud
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
More informationWat is nieuw in JD Edwards?
Wat is nieuw in JD Edwards? 1 Terug in de tijd Wat gebeurde er in februari 2005? 4 JD Edwards Product Roadmap 2005 5 JD Edwards Product Roadmap 2014 6 7 8 16 Hoe Cloudy is JD Edwards? Is het licentiemodel
More informationCloud. Regie. Cases.
Cloud. Regie. Cases. Agile SIAM Dave van Herpen Consultant Cloud Cases Regie 2 Grip op de cloud Hoe word ik een wendbare service broker? Cloud Cases Regie 3 Waarom cloud? innovation maintenance Private?
More informationSecurity Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo
Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security
More informationArchitecting Information Security Services for Federate Satellite Systems
Architecting Information Security Services for Federate Satellite Systems Marc Sanchez Net, Iñigo del Portillo, Bruce Cameron, Ed Crawley 3 nd International Federated Satellite Systems Workshop August
More informationTufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao Guocui.gao@tufts.
Tufts University Department of Computer Science COMP 116 Introduction to Computer Security Fall 2014 Final Project Investigating Security Issues in Cloud Computing Guocui Gao Guocui.gao@tufts.edu Mentor:
More informationAnton Wilsens. The LIRIS Academy 2010-2011 Keys to a successful mobile channel in the Financial Services Sector and beyond
LAC - "Architectuur voor nieuwe business modellen in de cloud" The LIRIS Academy 2010-2011 Keys to a successful mobile channel in the Financial Sector and beyond Anton Wilsens Mobile is coming no, wait
More informationCloud Computing Governance & Security. Security Risks in the Cloud
Cloud Computing Governance & Security The top ten questions you have to ask Mike Small CEng, FBCS, CITP Fellow Analyst, KuppingerCole This Webinar is supported by Agenda What is the Problem? Ten Cloud
More informationTheme 1: IT Governance and Audit Methodologies
Theme 1: IT Governance and Audit Methodologies Recent rapid development of new IT technologies was followed up by an instantaneous integration of them at the organizational level. The management of the
More informationSecurity/Information Assurance Measurements and Metrics
Security/Information Assurance Measurements and Metrics Wai Tsang, Ph.D. TecSec 6 Th Annual International Software Measurement & Analysis Conference Richmond, VA September 13, 2011 Agenda Software estimation
More informationCloud computing security in the Dutch Government
Cloud computing security in the Dutch Government John van Huijgevoort Senior Security Advisor, NCSC Agenda Introduction History / Process Relation with other ICT-projects Conclusion 1 Introduction: John
More informationMet je hoofd in de wolken. Ard-Jan Glas
Met je hoofd in de wolken Ard-Jan Glas Trend Hogere availability 24 uur per dag global customers Van mainframe naar distributed Omzet verlies door downtime Klanten stellen hogere eisen De volgende IT
More informationData Center Consolidation
Data Center Consolidation DHS Lessons Learned FDCCI Workshop June 11, 2010 1 Agenda Data Center Consolidation and your Organization Hotel, Enterprise, Cloud Lessons Learned IT Security Disaster Recovery
More informationCloud Computing. Cloud Computing An insight in the Governance & Security aspects
Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010
More informationSecuring The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master
Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is
More informationLaunching NVL Next. The future of leasing. 26 november 2015
Launching NVL Next The future of leasing 26 november 2015 Welcomes you Social media Live eventverslag op twitter en morgen op de NVL site Volg ons op @NVLlease of LinkedIn Twitter mee #NVLNext #innovatie
More informationThe Netherlands ICT R&D
The Netherlands ICT R&D In 2009, business expenditure on R&D (BERD) in the ICT sectors amounted to 672M, down from 674M the year before, resulting in a slightly increased R&D intensity of 2.7% of sectoral
More informationRisks and Countermeasures in the Public Cloud
Risks and Countermeasures in the Public Cloud Alessandro Vallega fond member of AIEA Security Business Development, Oracle Italy Oracle Community for Security Director Clusit Board of Directors Paragliding
More informationHow To Use Risk It
Risk IT A set of guiding principles and the first framework to help enterprises identify, govern and effectively manage IT risk. In business today, risk plays a critical role. Almost every business decision
More informationCloud Security Introduction and Overview
Introduction and Overview Klaus Gribi Senior Security Consultant klaus.gribi@swisscom.com May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious
More informationMagic Software Enterprises. Composite Application Development Suite
Magic Software Enterprises Composite Application Development Suite Magic Software Enterprises Founded in 1986 NASDAQ: MGIC (IPO 1991) Revenue ca. 60 M. US$ Ca. 500 Employees Worldwide Global Presents >
More informationISO 31000 de internationale richtlijn voor risicomanagement
ISO 31000 de internationale richtlijn voor risicomanagement Dick Hortensius NEN-Managementsystemen Agenda Achtergrond en ontwikkeling ISO Guide 73 en ISO 31000 De betekenis voor risicomanagers 1 overheid
More informationHoe onze wereld aan het veranderen is
Hoe onze wereld aan het veranderen is Frans Wittenberg CTO Cisco Sinds 2000 actief binnen Cisco Verantwoordelijk voor 3 systems engineering teams Verantwoordelijk voor partner organisatie,comerciële segment
More informationInformation security versus network security in the Internet as critical infrastructure Security of Internet and Critical Infrastructures: European
Information security versus network security in the Internet as critical infrastructure Security of Internet and Critical Infrastructures: European Experiences, Rome, 13 June 2011 Objectives Describe information
More informationCopyright 2015 VMdamentals.com. All rights reserved.
Copyright 2015. All rights reserved. Copyright 2015. All rights reserved. The S oftware Erik Zandboer Advisory vspecialist EMC 2 Europe West D efined D ata C enter Copyright 2015. All rights reserved.
More information... Stichting Empower European Universities at Maastricht ... Report on the annual accounts 14 December 2010 unti 31 December 2011 ... ... ...
Stichting Empower European Universities at Maastricht Report on the annual accounts 14 December 2010 unti 31 December 2011 BDO BDO To the Board of directors and the Management of Stichting Empower European
More informationSecure Cloud Identity Wallet
1 CREDENTIAL Secure Cloud Identity Wallet DS-02-2014 Dr. Arne Tauber u 2 CREDENTIAL Research Project Call: H2020-DS-2014-1 Acronym: CREDENTIAL Type of Action: IA Number: 653454 Partners: 12 Duration: 36
More informationhttp://www.guido.be/intranet/enqueteoverview/tabid/152/ctl/eresults...
1 van 70 20/03/2014 11:55 EnqueteDescription 2 van 70 20/03/2014 11:55 3 van 70 20/03/2014 11:55 4 van 70 20/03/2014 11:55 5 van 70 20/03/2014 11:55 6 van 70 20/03/2014 11:55 7 van 70 20/03/2014 11:55
More informationUnderstanding Crowd Behaviour Simulating Situated Individuals
Understanding Crowd Behaviour Simulating Situated Individuals Nanda Wijermans The research reported in this thesis was funded by the Netherlands Ministry of Defence ("DO-AIO" fund contract no TM-12). The
More informationPRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH
PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser AIT Austrian Institute of Technology GmbH FOC2015 Vienna / 17.06.2015 Challenges for Future ICT Systems Cloud computing
More informationENISA and Cloud Security
ENISA and Cloud Security Rossen Naydenov Network Information Security Officer Critical Information Infrastructure Protection Department - ENISA European Union Agency for Network and Information Security
More informationMachineontwerp volgens IEC 62061
Machineontwerp volgens IEC 62061 Insert Photo Here Safety solution Architect Safety Local Business Leader Benelux. Stephen Podevyn Safety Solution Seminar Agenda deel 1 1. Richtlijnen en normen 2. Safety
More informationVan SARA naar Vancis ICT voor de Kenniseconomie. Dr. Anwar Osseyran SARA/Vancis Managing Director osseyran@sara.nl
Van SARA naar Vancis ICT voor de Kenniseconomie Dr. Anwar Osseyran SARA/Vancis Managing Director osseyran@sara.nl Science Park Amsterdam a world of science in a city of inspiration Faculty of Science of
More informationWeb Services Standards: obix in the wider XML Web Services context
www.oasis-open.org Web Services Standards: obix in the wider XML Web Services context Pim van der Eijk OASIS European Representative OASIS Mission OASIS drives the development, convergence and adoption
More informationBUSINESS MANAGEMENT SUPPORT
BUSINESS MANAGEMENT SUPPORT Business disadvantages using cloud computing? Author: Maikel Mardjan info@bm-support.org 2010 BM-Support.org Foundation. All rights reserved. EXECUTIVE SUMMARY Cloud computing
More informationMedische hulpmiddelen en geneesmiddelen: Verschuivende grenzen in Brussel?
Medische hulpmiddelen en geneesmiddelen: Verschuivende grenzen in Brussel? Sabina Hoekstra-van den Bosch Philips HealthTech, Global Regulations & Standards Arnhem, June 19, 2015 Samenvatting Verschil tussen
More informationSoftware VOC netwerkbijeenkomst De kansen van OEM. Hans Schut OEM Partner Manager Nederland 9 juli 2014
Software VOC netwerkbijeenkomst De kansen van OEM Hans Schut OEM Partner Manager Nederland 9 juli 2014 Wat is OEM? Het principe Wanneer een bedrijf zijn producten verkoopt aan andere bedrijven, en dat
More informationThe hackers are ready. Are we?
The hackers are ready. Are we? Shopt IT 2015-30 april Kurt Callewaert HOWEST UNIVERSITY of APPLIED SCIENCES Lecturer Applied Computer Science- Computer & Cyber Crime Professional Research manager ISACA
More informationHow to manage IT Risks and IT Compliance as a Service
How to manage IT Risks and IT Compliance as a Service in complex IS environment The Road Ahead in the Cloud Marek Skalický, CISM, CRISC Regional Account Manager for CAEE For SECURE 2012 Warsaw Agenda IT/Security
More informationThemabijeenkomst 17 april 2003
Themabijeenkomst 17 april 2003 Evelyn Gerritsen (evelyn.gerritsen@oracle.com) Jan Poortinga (jan.poortinga@oracle.com) Sales Consultants Oracle Nederland Agenda Waarom integratie Diverse vormen van integratie
More informationWorking Group on. First Working Group Meeting 29.5.2012
Working Group on Cloud Security and Privacy (WGCSP) First Working Group Meeting 29.5.2012 1 Review of fexisting i Standards d and Best Practices on Cloud Security Security Standards and Status List of
More informationInformation Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
More informationOperations and Network Center (CORE)
Operations and Network Center (CORE) Get to know us The Operations and Network Center (CORE) is the cornerstone in Informatica ECI's strategy for the provision of managed information technology services.
More informationTiSEM Master's Programs admission academic year 2016-2017 (students who intend to start in september 2016 or February 2017)*
Versie 18-09-15 TiSEM Master's Programs admission academic year 2016-2017 (students who intend to start in september 2016 or February 2017)* Bachelor/Master MSc Accountancy MSc Economics MSc Finance MSc
More informationBusiness Partners Strategie Nederland
Business Partners Strategie Nederland Strategie KOEL / Toshiba Stijn Reunis - Sales Director KOEL Benelux Peter Doldersum - Channel Manager Toshiba NL Strategie Toshiba Innovatie! Hardware is belangrijk,
More informationSecurity Inspection Inc. Solutions to secure your network
Security Inspection Inc. TM Solutions to secure your network Secure Cloud Utilization Strategies! responsibilities Out of 127 cloud providers surveyed, a recently released study showed that only 25% of
More informationHow to deliver Self Service IT Automation
How to deliver Self IT Automation Roeland Verhoeven, Manager Cloud Supply Chain Simac ICT Rien du Pre, HP Cloud Solution Architect Datum: 17-06-2014 Hoe te komen tot een Self Customer Centric Portal Er
More informationSDN van start naar finish
SDN van start naar finish Ralph Wanders Datacenter Solutions Manager Rick Mur Senior System Engineer Juniper Networks IT SECURITY IS TOPSPORT! Beperkingen datacenter architecturen! Agility/Netwerk virtualisatie!
More informationTTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures,
TTP.NL Scheme for management system certification of Trust Service Providers issuing Qualified Certificates for Electronic Signatures, Public Key Certificates, Website Certificates and / or Time-stamp
More informationIS research relevance from an industrial perspective. Ir. A.F.Baldinger Chairman of NAF
IS research relevance from an industrial perspective Ir. A.F.Baldinger Chairman of NAF A.F.Baldinger Studied Applied Physics TU Delft [66-73] Industry Experience: 35 years experience (Telecom, Software
More informationCloud Based E-Government: Benefits and Challenges
Cloud Based E-Government: Benefits and Challenges Saleh Alshomrani 1 and Shahzad Qamar 2 1 Faculty of Computing and IT, King Abdulaziz University, Jeddah, Saudi Arabia 2 Faculty of Computing and IT, North
More informationMaster of Science Advanced Software Services. Courses description
Master of Science Advanced Software Services Courses description Architecture of Service Oriented Information Systems The course explains the concept of the different architectural views (e.g. function
More informationSecurity for Your Business.
Security for Your Business. Knowing what really matters. Information and telecommunications security. More than just an interdisciplinary topic. Outstanding industry solutions are created from long-standing
More informationRecent Researches in Electrical Engineering
The importance of introducing Information Security Management Systems for Service Providers Anel Tanovic*, Asmir Butkovic **, Fahrudin Orucevic***, Nikos Mastorakis**** * Faculty of Electrical Engineering
More informationWaarom u nog niet naar de Cloud moet migreren
DO the CLOUD donderdag 12 mei 2011 Aviodrome - Lelystad DO the CLOUD Waarom u nog niet naar de Cloud moet migreren Ron Moerman Technology Officer Sogeti Waarom u nog niet naar de Cloud moet migreren Is
More informationJOB DESCRIPTION REF: 50039237
JOB DESCRIPTION REF: 50039237 Note: This job description does not form part of the employee s contract of employment but is provided for guidance. The precise duties and responsibilities of any job may
More informationResilience in Networks: Elements and Approach for a Trustworthy Infrastructure. Andreas Fischer and Hermann de Meer
Resilience in Networks: Elements and Approach for a Trustworthy Infrastructure Andreas Fischer and Hermann de Meer The ResumeNet project Resilience & Survivability for future networking framework, mechanisms
More informationITSM Governance In the world of cloud computing
ITSM Governance In the world of cloud computing Housekeeping Welcome to the Webinar Use the control panel to ask questions Can you see & hear us? enter your name & city to confirm Type Your Questions Here
More informationLean Maintenance & Asset Management The Best of Both Worlds
Lean Maintenance & Asset Management The Best of Both Worlds Ir. Martin van den Hout CMRP : Asset Management, Maintenance & Reliability Introductie 2 Ir. Martin van den Hout Certified Maintenance & Reliability
More informationIT consulting Advice into action
www.pwc.lu/it-consulting IT consulting Advice into action Using technology to bring value to your business BEST ICT STRATEGY COMPANY LUXEMBOURG ICT AWARDS 2010 Our services PwC helps private and public
More informationOutSystems on Oracle
OutSystems on Oracle Spreker(s) : Datum : E-mail : Marieke Gijsberts, Martijn Habraken, Martin Westra 12-05-2015 info@transfer-solutions.com WWW.TRANSFER-SOLUTIONS.COM OUTSYSTEMS ON ORACLE Agenda Intro
More informationCloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014
Cloud Security Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014 Agenda Introduction Security Assessment for Cloud Secure Cloud Infrastructure
More informationCloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL
Cloud computing and personal data protection Gwendal LE GRAND Director of technology and innovation CNIL 1 Data protection in Europe Directive 95/46/EC Loi 78-17 du 6 janvier 1978 amended in 2004 (France)
More informationIntegrated Information Management Systems
Integrated Information Management Systems Ludk Novák ludek.novak@anect.com ANECT a.s. Brno, Czech Republic Abstract The article tries to find consensus in these tree different types of the systems the
More informationLeverage energy efficiency potentials with the principals of Industry 4.0 Background and experiences out of the application in a family-owned company
Leverage energy efficiency potentials with the principals of Industry 4.0 Background and experiences out of the application in a family-owned company Charles Preeker, Weidmüller Amersfoort IE MotorenEvent
More information