UC EABok - Security Principles and Standards Review
|
|
|
- Sybil Morgan
- 9 years ago
- Views:
Transcription
1 UC EABok - Security Principles and Standards Review Bo Pitsker, UCOP Enterprise Security Architect [email protected] July 12, 2016
2 Agenda Meeting objectives Presenter background Enterprise architecture intro Enterprise security architecture ITLC, ITAC and the OP EA team ITAC EaBok artifact structure and function Security artifact overview EA staff and resources for security Concluding remarks Q & A 2
3 Objectives for today s presentation Introduce Enterprise Architecture (EA) Relate Enterprise Architecture to Security Architecture Introduce enterprise security frameworks Describe UC s Enterprise Architecture Book of Knowledge (EABok) and its usage Motivate the use of UC EA security resources 3
4 Who are we? ITAC (the team formerly known as ITAG) Information Technology Architecture Committee A standing committee of ITLC Campus representatives, appointed by local CIOs, responsible for creation and adoption of EA artifacts Enterprise Architecture group at OP Formally part of OP ITS Strategic Planning organization Architectural domains supported include business architecture, application architecture, data architecture, technology architecture, and security architecture Supports ITAC, participates in Systemwide initiatives 4
5 Who am I? Enterprise Security Architect at OP for 2 years Involved with product security and services at Polycom Responsible for networking and security at San Francisco International Airport (SFO) Provided classified services at Lawrence Livermore National Laboratory (LLNL) Provided 1 st managed security services and secure hosting at Pilot Network Services 5
6 What is Enterprise Architecture? An EA is a conceptual blueprint that defines the structure and operation of an organisation. Just as architecture provides a blueprint for constructing a building, Enterprise Architecture provides a blueprint and roadmap for aligning business strategy with IT. The aim of an Enterprise Architecture is to support the determination of how an organisation can most effectively achieve its current and future objectives. The Enterprise Architecture provides a guide to direct the evolution and transformation of enterprises with technology. 6
7 Frameworks for enterprise What is a framework? architecture A structure for organizing information that defines the scope of the architecture (what the EA program will document) and how the areas of the architecture relate to each other. TOGAF The Open Group Zachman Framework John Zachman 7
8 TOGAF What is TOGAF? The Open Group Architecture Framework (TOGAF) is a framework for enterprise architecture that provides an approach for designing, planning, implementing, and governing an enterprise information technology architecture. TOGAF is a high level approach to design. It is typically modeled at four levels: Business, Application, Data, and Technology. It relies heavily on modularization, standardization, and already existing, proven technologies and products. Principally process oriented Model-driven 8
9 TOGAF architectural domains 9
10 The Zachman Framework What is the Zachman Framework? The Zachman Framework is an enterprise ontology and is a fundamental structure for Enterprise Architecture which provides a formal and structured way of viewing and defining an enterprise. It s not a framework, the title notwithstanding Zachman uses a 6 x 6 matrix to classify architectural artifacts, audiences, and models Zachman and TOGAF are complementary, not competitive 10
11 The Zachman matrix 11
12 So where is the security architecture? 12
13 SABSA builds on Zachman and TOGAF 13
14 Collapsing SABSA into a single stack 14
15 Other security frameworks lack an EA perspective but bring subject matter depth and rigor to the organization NIST/CSA Reference Architecture (for clouds) HITRUST CSF (for healthcare) NIST Cybersecurity Framework (NIST CSF) Note that many other standards and guidelines are not frameworks ISO 27001/2 PCI DSS SSAE 16 SOC2 15
16 NIST/CSA Reference Architecture 16
17 HITRUST CSF 17
18 The NIST Cybersecurity Framework (NIST CSF) has gained widespread acceptance, although it is not yet widely implemented 18
19 UC has adopted the NIST CSF The CRGC approved the NIST CSF as a formal guidance document for all locations Because of its breadth, implementation of the NIST CSF will be distributed across many organizations and disciplines The UC EA team is planning to develop supporting artifacts, such as a crosswalk between UC EABoK artifacts and the NIST CSF 19
20 Key components of the NIST CSF The Framework Core is a set of cybersecurity activities, desired outcomes, and applicable references Framework Implementation Tiers provide context on how an organization views cybersecurity risk and the processes in place to manage that risk. A Framework Profile represents the outcomes based on business needs. 20
21 NIST Cybersecurity Framework (CSF) 21
22 The EA team and IT Architecture Committee (ITAC) developed a framework to manage the end-to-end lifecycle of architecture artifacts An Enterprise Architecture Assets Framework (EAAF) was created for lifecycle management of assets that may advance consistency, reuse or interoperability The EAAF is loosely modeled after TOGAF The collection of Enterprise Architecture Assets established an EA Body of Knowledge (EABoK) 22
23 Types of Enterprise Architecture Assets (EAAs) developed or planned 23
24 What is a principle? A generalized type of business driver, a principle is any statement that is thought, by senior leadership, to be useful guidance for the organization to consider when making business decisions. Principles are value statements, not directives Principles are long-term, enduring and seldom amended Principles are enforced with policies, standards, and procedures 24
25 Architectural principles anchor the EAAF All EAAs should trace back to a principle Architectural principles mind map 25
26 What is a standard? A mandatory requirement Set by policies that help produce the procedures that will be followed to carry out the objectives of the policies. Standards attempt to tie the procedures with their policies. A collection of specific and detailed requirements that must be met. Specifies the minimum set of administrative, technical, or procedural controls required to meet the related policy. 26
27 The next level of EAAs are Standards and Guidelines Security standards mind map 27
28 What is a guideline? Recommended practice that allows some discretion or leeway in its interpretation, implementation, or use. A document describing best practice, which recommends what should be done. Compliance with a guideline is not normally enforced. A description of a particular way of accomplishing something that is less prescriptive than a procedure 28
29 The next level of EAAs are Standards and Guidelines (continued) Security guidelines mind map 29
30 What is a reference architecture? [A] Reference Architecture is an authoritative source of information about a specific subject area that guides and constrains the instantiations of multiple architectures and solutions. A reference architecture models the abstract architectural elements in the domain of interest independent of the technologies, protocols, and products that are used to implement a specific solution for the domain. 30
31 Yet another EAA type is the Reference Architecture Reference architecture mind map 31
32 EABoK Screen Shots home page 32
33 EABoK Screen Shots EAA list 33
34 EABoK Screen Shots EAA types 34
35 EABoK Screen Shots EAA detail 35
36 EABoK Screen Shots EAA status 36
37 EABoK Screen Shots EA Glossary (EAA-036) 37
38 About the EABoK Enterprise Architecture Glossary Over 5,000 entries; 1,100 pages Subject matter includes: Enterprise architecture Business architecture Technology architecture Data architecture Change management and organizational development Risk, privacy, and compliance Security and identity management architecture Physical security, operations security, security awareness Project management Application architecture Infrastructure architecture Service oriented architecture (SOA) Solutions architecture Requirements engineering Service management Record management Procurement Knowledge management 38
39 The EABoK Enterprise Architecture Glossary benefits include: Entries have complete citations Each entry is tagged with a quality indicator Extensive cross-references Entries are linkable from any MS Office document or from web pages UC-specific entries are marked The Glossary is available in multiple formats, including Word and PDF 39
40 EA Security principles EAA # Principle EAA-031 Data is Secure EAA-041 Compliance with Law EAA-042 Business Continuity EAA-043 Management of enterprise systems EAA-045 Security compliance with industry standards and best practices 40
41 EA Security standards EAA # Standard EAA-006 Federated authentication protocols (Cross-campus Applications) EAA-007 User Identification Attributes EAA-008 Web Service standard for Restricted Information EAA-009 Two-way SSL (Mutual Authentication) EAA-011 WS-Security 1.1 EAA-013 SSH File Transfer Protocol Key (SFTP) EAA-018 "Last Mile" security for Web Services EAA-032 Account Owner Uniqueness EAA-033 Password Complexity and Online Guessing Resistance EAA-035 Password Storage EAA-039 PGP Encryption for files EAA-047 Don't use MD5 for cryptographic functions EAA-053 Data Protection for Test Data EAA-055 RC4 usage is disallowed EAA-056 REST and Secure REST EAA-060 SHA-1 usage is disallowed for Cryptographic Functions EAA-065 Event Logging and Management 41
42 EA Security guidelines and references EAA # EAA-010 EAA-012 EAA-034 EAA-036 EAA-037 EAA-050 EAA-061 Guideline / Reference Artifact Provisioning or Generating X.509 Certificates Secure FTP set-up guidelines for UCPath Credential Renewal/Password Reset Enterprise Architecture Glossary Delegated Access Data Classification Questionnaire/Checklist Secure Data Transfer Mechanisms 42
43 EA Security reference architectures EAA # EAA-038 EAA-048 Reference Architecture Password Complexity - Fixed Composition and Lockout Password Complexity - Variable Composition Fixed Lockout 43
44 Conclusion Security is driven by business needs Enterprise architecture provides the basis for security transformation Frameworks establish the means to organize and prioritize the work of security The UC EA team and ITAC have established a process and a body of work for security We are here to help (and we re not from the IRS!) 44
45 Q & A 45
46 For more information Presenter Bo Pitsker, Enterprise Security Architect UC EABoK sp.ucop.edu/sites/its/apptech/enterprisearchitecture/eabok/default.aspx If unable to access, contact Jerome McEvoy, Information Technology Architecture Committee (ITAC) spaces.ais.ucla.edu/display/ucitag/home 46
Anypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
Objects and Object Relations Around Business Modelling and Business Architecture. Professor Mark von Rosing
Objects and Object Relations Around Business Modelling and Business Architecture Professor Mark von Rosing Prof. Mark von Rosing Professor BPM & EA Guru Business Transformation Evangelist Internationally
Setting up an Effective Enterprise Architecture capability. Simon Townson Principal Enterprise Architect SAP
Setting up an Effective Enterprise Architecture capability Simon Townson Principal Enterprise Architect SAP Agenda Why? People and Organisation EA Framework Standards and Templates Tools Processes SAP
Independent Insight for Service Oriented Practice. An SOA Roadmap. John C. Butler Chief Architect. A CBDI Partner Company. www.cbdiforum.
Independent Insight for Oriented Practice An SOA Roadmap John C. Butler Chief Architect A CBDI Partner Company www.cbdiforum.com Agenda! SOA Vision and Opportunity! SOA Roadmap Concepts and Maturity Levels!
Enterprise Security Architecture for Cyber Security. M.M.Veeraragaloo 5 th September 2013
Enterprise Security Architecture for Cyber Security M.M.Veeraragaloo 5 th September 2013 Outline Cyber Security Overview TOGAF and Sherwood Applied Business Security Architecture (SABSA) o o Overview of
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera
Approach to Information Security Architecture Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera About TeliaSonera TeliaSonera provides network access and telecommunication services that help
Cloud Computing and SOA from Enterprise Perspective. Yan Zhao, PhD ArchiTech Consulting LLC [email protected] www.architechllc.com Oct.
Cloud Computing and SOA from Enterprise Perspective Yan Zhao, PhD ArchiTech Consulting LLC [email protected] www.architechllc.com Oct., 2009 Content Summary The evolution of IT and IT infrastructure,
CSG UCLA Enterprise Service Bus (ESB)
CSG UCLA Enterprise Service Bus (ESB) May 28, 2013 Draft Information Technology Services Enterprise Service Bus (ESB) The UCLA Enterprise Service Bus (ESB) is an application middleware solution designed
Enterprise Architecture (Re)Charter Template
Enterprise Architecture (Re)Charter Template To learn more about this full research or to inquire about membership, contact us: +1-866-913-8101 IT.Support@ executiveboard.com www.cebglobal.com/it CEB Enterprise
Security Architecture Principles A Brief Introduction. Mark Battersby 2013-05-22, Oslo
Security Architecture Principles A Brief Introduction Mark Battersby 2013-05-22, Oslo Agenda About Me Enterprise Architecture Architecture Principles Our Philosophy Security Architecture Principles Security
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
Open Group SOA Governance. San Diego 2009
Open Group SOA Governance San Diego 2009 SOA Governance Aspects A comprehensive view of SOA Governance includes: People Organizational structures Roles & Responsibilities Processes Governing processes
Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing
Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing Presented by : Ajay Budhraja, Chief, Enterprise Services ME (Engg), MS (Mgmt), PMP, CICM, CSM,
Five best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
Reorganized Information Technology Architecture Committee (ITAC) Dr. Hébert Díaz-Flores Campus Chief Technology Architect
Reorganized Information Technology Architecture Committee (ITAC) Dr. Hébert Díaz-Flores Campus Chief Technology Architect Background One of the initial priorities assigned to me after being appointed as
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Recommendations for the PIA. Process for Enterprise Services Bus. Development
Recommendations for the PIA Process for Enterprise Services Bus Development A Report by the Data Privacy and Integrity Advisory Committee This report reflects the consensus recommendations provided by
SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government
SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session
The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session Robert Smith Systemwide IT Policy Director Compliance & Audit Educational Series 5/5/2016 1 Today s reality There are two kinds
ISO 27000 Information Security Management Systems Professional
ISO 27000 Information Security Management Systems Professional Professional Certifications Sample Questions Sample Questions 1. A single framework of business continuity plans should be maintained to ensure
E-HEALTH PLATFORMS AND ARCHITECTURES
E-HEALTH PLATFORMS AND ARCHITECTURES E-Government Andreas Meier Nicolas Werro University of Fribourg Alfredo Santa Cruz 19.01.2007 Contents 1. Introduction 2. Existing Capabilities and Strategic Approach
NIST Cloud Computing Program Activities
NIST Cloud Computing Program Overview The NIST Cloud Computing Program includes Strategic and Tactical efforts which were initiated in parallel, and are integrated as shown below: NIST Cloud Computing
Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture
Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and
Service Modelling & Service Architecture:
Service Modelling & Service Architecture: From Service Renewal and Service Flows to Service Architecture Presenter: Professor Paul Buhler Head of the Global University Alliance SOA Research & Development
Building Reference Security Architecture
Information Security, Privacy and Compliance Building Reference Security Architecture Bob Steadman, Sr. Director Predrag Zivic, Sr. Security Architect Information Security Too many organizations still
Federal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
FTP-Stream Data Sheet
FTP-Stream Data Sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control
Professional Cloud Solutions and Service Practices
Emerging Technologies Professional Cloud Solutions and Service Practices The Shift to a Service-on-Demand Business Operating Model and Working Practices By Mark Skilton, CEO, Digital Ecosystem practices,
Service-Oriented Architecture and its Implications for Software Life Cycle Activities
Service-Oriented Architecture and its Implications for Software Life Cycle Activities Grace A. Lewis Software Engineering Institute Integration of Software-Intensive Systems (ISIS) Initiative Agenda SOA:
NIST Cybersecurity Framework. ARC World Industry Forum 2014
NIST Cybersecurity Framework Vicky Yan Pillitteri NIST ARC World Industry Forum 2014 February 10-13, 2014 Orlando, FL Executive Order 13636 Improving Critical Infrastructure Cybersecurity It is the policy
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
SOA for Healthcare: Promises and Pitfalls
SOA for Healthcare: Promises and Pitfalls Dennis B. Smith [email protected] SOA in Health Care Conference: Value in a Time of Change Chicago, IL USA June 3, 2009 Agenda Healthcare IT Challenges SOA: The
Microsoft SOA Roadmap
Microsoft SOA Roadmap Application Platform for SOA and BPM Thomas Reimer Enterprise Technology Strategist, SOA and BPM Microsoft Corporation (EMEA) Trends and Roadmap THE FUTURE OF DYNAMIC IT Market Trends
SOA GOVERNANCE MODEL
SOA GOVERNANCE MODEL Matjaz B. Juric University of Ljubljana, Slovenia [email protected] Eva Zupancic University of Ljubljana, Slovenia Abstract: Service Oriented Architecture (SOA) has become
California Enterprise Architecture Framework
Version 2.0 August 01, 2013 This Page is Intentionally Left Blank Version 2.0 ii August 01, 2013 TABLE OF CONTENTS 1 Executive Summary... 1 1.1 What is Enterprise Architecture?... 1 1.2 Why do we need
How To Develop An Enterprise Architecture
OSI Solution Architecture Framework Enterprise Service Center April 2008 California Health and Human Services Agency Revision History REVISION HISTORY REVISION/WORKSITE # DATE OF RELEASE OWNER SUMMARY
DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE
TECHNICAL PROPOSAL DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE A White Paper Sandy Bacik, CISSP, CISM, ISSMP, CGEIT July 2011 7/8/2011 II355868IRK ii Study of the Integration Cost of Wind and Solar
Deployment Guide: Unidesk and Hyper- V
TECHNICAL WHITE PAPER Deployment Guide: Unidesk and Hyper- V This document provides a high level overview of Unidesk 3.x and Remote Desktop Services. It covers how Unidesk works, an architectural overview
Updating the Clinger-Cohen Competencies for Enterprise Architecture
Updating the Clinger-Cohen Competencies for Enterprise ure Executive Summary The Federal Chief Information Officers (CIO) Council has been empowered to regularly update the Clinger- Cohen competencies
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0
Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0 EA APPROVALS EA Approving Authority: Revision
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
Proven approaches for Legacy Systems Modernization
Proven approaches for Legacy Systems Modernization Dr. Setrag Khoshafian, Chief Evangelist Agenda: Legacy Modernization Through BPM The Pain Points for Legacy Modernization BPM Suites For Modernizing The
Enterprise Architecture: A Governance Framework
Enterprise Architecture: A Governance Framework Part I: Embedding Architecture into the Organization Sohel Aziz, Thomas Obitz, Reva Modi and Santonu Sarkar The whitepapers arei related to two sessions
Federal Enterprise Architecture Framework
Resource Optimization Reporting January 29, 2013 Federal Enterprise Architecture Framework Version 2 Service Delivery Governance Current Views Human Capital Mgmt. (KSAs) Enterprise Strategic Plan/Goals
SOA: The missing link between Enterprise Architecture and Solution Architecture
SOA: The missing link between Enterprise Architecture and Solution Architecture Jaidip Banerjee and Sohel Aziz Enterprise Architecture (EA) is increasingly being acknowledged as the way to maximize existing
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
SOA and BPO SOA orchestration with flow. Jason Huggins Subject Matter Expert - Uniface
SOA and BPO SOA orchestration with flow Jason Huggins Subject Matter Expert - Uniface Objectives Define SOA Adopting SOA Business Process Orchestration Service Oriented Architecture Business Level Componentisation
Enterprise Architecture Glossary by Set
Set: Enterprise Architecture (EA) Glossary Term Source Enterprise architecture terms based on NASCIO,, and other industry best practices. Description Albers Equal Area Projection egsc.usgs.gov A projection
Policy Driven Practices for SOA
Independent Insight for Oriented Practice Policy Driven Practices for SOA Lawrence Wilkes CBDI Forum www.cbdiforum.com Agenda! Enterprise SOA Challenge! SOA Policy Areas! Layered Architecture as a basis
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
The Cornwell Enterprise Architecture Maturity Dashboard
The Cornwell Enterprise Architecture Maturity Dashboard Ian Bailey This paper outlines Cornwell s approach to assessing the maturity of an organisation s Enterprise Architecture. The method uses standard
Requirement Management with the Rational Unified Process RUP practices to support Business Analyst s activities and links with BABoK
IBM Software Group Requirement Management with the Rational Unified Process RUP practices to support Business Analyst s activities and links with BABoK Jean-Louis Maréchaux Software IT Specialist IBM Rational
SABSA A Brief Introduction
SABSA A Brief Introduction Mark Battersby 2013-05-15 Agenda SABSA Overview SABSA Security Architecture SABSA Security Architecture Matrix Operational Security Architecture Matrix SABSA Business Attributes
NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
COBIT 5 For Cyber Security Governance and Management. Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE)
COBIT 5 For Cyber Security Governance and Management Nasser El-Hout Managing Director Service Management Centre of Excellence (SMCE) Cybersecurity Governance using COBIT5 Cyber Defence Summit Riyadh, KSA
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
Open Ontology Repository Initiative
Open Ontology Repository Initiative Frank Olken Lawrence Berkeley National Laboratory National Science Foundation [email protected] presented to CENDI/NKOS Workshop World Bank Sept. 11, 2008 Version 6.0 DISCLAIMER
SOA Adoption Challenges
Introduction Raju Alluri SOA adoption is evolutionary rather than revolutionary. It is a journey and not an end state. There are many challenges in the SOA journey. First and foremost, the challenge is
An Analysis of The SABSA Framework. Note: Most of this information comes from the SABSA website. TJS. SABSA Overview
Note: Most of this information comes from the SABSA website. TJS SABSA Overview SABSA is a model and a methodology for developing risk-driven enterprise information security architectures and for delivering
The Perusal and Review of Different Aspects of the Architecture of Information Security
The Perusal and Review of Different Aspects of the Architecture of Information Security Vipin Kumar Research Scholar, CMJ University, Shillong, Meghalaya (India) Abstract The purpose of the security architecture
Clever Security Overview
Clever Security Overview Clever Security White Paper Contents 3 Introduction Software Security 3 Transport Layer Security 3 Authenticated API Calls 3 Secure OAuth 2.0 Bearer Tokens 4 Third Party Penetration
Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments
A Secure Shell Key Management White Paper Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments Emerging trends impacting PCI-DSS compliance requirements in secure shell deployments
OVERVIEW OF THE INDUSTRY STANDARDS
OVERVIEW OF THE INDUSTRY STANDARDS Table of Contents Background... 3 What is it we do Around Standard... 3 Why we do it... 3 How is it we do it... 4 Which areas do we develop Industry Standards... 4 1.
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
INFORMATION SYSTEMS. Revised: August 2013
Revised: August 2013 INFORMATION SYSTEMS In November 2011, The University of North Carolina Information Technology Security Council [ITSC] recommended the adoption of ISO/IEC 27002 Information technology
PCI Compliance Considerations
PCI Compliance Considerations This article outlines implementation considerations when deploying the Barracuda Load Balancer ADC in an environment subject to PCI Data Security Standard (PCI DSS) compliance.
THE COMMON APPROACH TO FEDERAL ENTERPRISE ARCHITECTURE
THE COMMON APPROACH TO FEDERAL ENTERPRISE ARCHITECTURE May 2, 2012 Table of Contents Introduction.. 3 Overall Concept.. 4 Primary Outcomes.. 5 Levels of Scope 8 Basic Elements 11 Documentation.... 26 Reference
Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8
Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA
This article was downloaded by: [188.204.15.66] On: 20 February 2012, At: 01:40 Publisher: Taylor & Francis Informa Ltd Registered in England and Wales Registered Number: 1072954 Registered office: Mortimer
Security Architecture and Design from a Business/Enterprise Driven Viewpoint
Security Architecture and Design from a Business/Enterprise Driven Viewpoint Introduction to Enterprise Security Architecture using the SABSA methodology, and design pattern examples Robert Trapp, Perry
70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready?
SESSION ID: GRC-W04 70% of US Business Will Be Impacted by the Cybersecurity Framework: Are You Ready? Tom Conkle Cybersecurity Engineer G2, Inc. @TomConkle Greg Witte Senior Security Engineer G2, Inc.
Extended Enterprise Architecture Framework Essentials Guide
Extended Enterprise Architecture Framework Essentials Guide Editorial Writer: J. Schekkerman Version 1.5 2006 Preface An enterprise architecture (EA) establishes the organization-wide roadmap to achieve
Enterprise Security Architecture Concepts and Practice
Enterprise Architecture Concepts and Practice Jim Whitmore [email protected] Presentation to Open Group Oct 22, 2003 Enterprise Architecture Abstract In the early 90 s IBM Global Services created a Consultancy
Document control for sensitive company information and large complex projects.
Data sheet Problem FTP-Stream solves four demanding business challenges: Global distribution of files any size. File transfer to / from China which is notoriously challenging. Document control for sensitive
Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6
to Assess Cybersecurity Preparedness 1 of 6 Introduction Long before the signing in February 2013 of the White House Executive Order Improving Critical Infrastructure Cybersecurity, HITRUST recognized
IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014
IT Cloud / Data Security Vendor Risk Management Associated with Data Security September 9, 2014 Speakers Brian Thomas, CISA, CISSP In charge of Weaver s IT Advisory Services, broad focus on IT risk, security
IT Governance: The benefits of an Information Security Management System
IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
STERLING SECURE PROXY. Raj Kumar Integration Management, Inc. [email protected]
STERLING SECURE PROXY Raj Kumar Integration Management, Inc. [email protected] Agenda Terminology Proxy Definition Sterling Secure Proxy Overview Architecture Components Architecture Diagram
Cloud Security for Federal Agencies
Experience the commitment ISSUE BRIEF Rev. April 2014 Cloud Security for Federal Agencies This paper helps federal agency executives evaluate security and privacy features when choosing a cloud service
Role of Enterprise Architecture in Mergers & Acquisitions. Satish Chandra, Mahindra Satyam
Role of Enterprise Architecture in Mergers & Acquisitions Satish Chandra, Mahindra Satyam Agenda Definitions EA and M&A related experiences Need for EA Intervention in M&A Using EA in M & A Scenarios Discussion
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) 1. Reporting Function. The Applications Consultant reports directly to the CIO
TERMS OF REFERENCE (TORs) OF CONSULTANTS - (EAG) Consultant - Enterprise Systems & Applications 1. Reporting Function. The Applications Consultant reports directly to the CIO 2. Qualification and Experience
