How To Write A Secure Cloud Computing For Critical Infrastructure

Size: px
Start display at page:

Download "How To Write A Secure Cloud Computing For Critical Infrastructure"

Transcription

1 SEcure Clud cmputing fr CRitical Infrastructure IT Methds and Technlgies fr Secure Clud Cmputing fr Critical InfrastructureIT Dr Markus Tauber SECCRIT Crdinatr AIT Austrian Institute f Technlgy AIT Austrian Institute f Technlgy ETRA Investigación y Desarrll Fraunhfer Institute fr Experimental Sftware Engineering IESE Karlsruhe Institute f Technlgy NEC Eurpe Lancaster University Mirasys Hellenic Telecmmunicatins Organizatin OTE Ayuntamient de Valencia Amaris

2 Why we are here SECCRIT Intrductin Technical & Legal Mtivatins Applicatin f Research Outputs Increase the real-wrld implicatins via yu SECCRIT Cnsrtium 2

3 The SECCRIT Prject Research prject n secure Clud Cmputing fr critical infrastructure IT 10 Partners frm Austria, Finland, Germany, Greece, Spain and the UK. Prject budget 4.8 Mi, partly funded by EC FP7 Prgramme Prject duratin % f the prject cmpleted 25 public deliverables SECCRIT Cnsrtium 3

4 SECCRIT s Overall Gal analyse and evaluate clud cmputing with respect t security risks in sensitive envirnments i.e. critical infrastructures t develp Traffic Cntrl Public Safety (CCTV) methdlgies technlgies, best practices fr secure, trustwrthy, high assurance legal cmpliant clud cmputing envirnments fr critical infrastructure IT. Investigate real-wrld prblems SECCRIT Cnsrtium 5

5 Prblem Definitin High Level Everything ges clud Cnsumer data like ur s r phts (ggle mail and ther ggle services) Public administratin IT services Sn all kinds f applicatins (incl. Critical Infrastructure - CI) Requirements fr clud applicatins vary Cmmercial applicatins mainly fcus n scalability & elasticity Requirements in CI regarding: verall redundancy, data availability, authenticity, secure access, trust and prtectin f the citizens are typically higher than in cmmercial applicatins. Cmmn Users Requirements cnverge with what is CI standard What is the prblem? Clud services abstract ver used resurces, are paque and make it hard t determine technical reasns fr (security) failure and hence make the develpment f cuntermeasures This als implies, frm a legal perspective, that it is hard t determine wh s fault it is and t shw ne hasn t acted negligent SECCRIT Cnsrtium 6

6 Key Objectives Legal Guidance n Data Prtectin and Evidence Understand and manage risk assciated with clud envirnments Understand clud behavir in the face f challenges Establish best practices fr secure clud service implementatins Demnstratin f utput in real-wrld applicatin scenaris SECCRIT Cnsrtium 9

7 Key Objectives Activities & Output Legal Guidance n Data Prtectin and Evidence Understand and manage risk assciated with clud envirnments Understand clud behavir in the face f challenges Establish best practices fr secure clud service implementatins Demnstratin f utput in real-wrld applicatin scenaris Definitin f legal guidance n SLA cmpliance, prvisin f evidence, and data prtectin fr clud services Risk Assessment and Management Methdlgy Plicy Specificatin Methdlgy and Tl Clud Assurance Prfile and Evaluatin Methd Anmaly Detectin Techniques and Tls Plicy Decisin and Enfrcement Tls Clud Resilience Management Framewrk Tls fr Audit Trails and Rt Cause Analysis Mdel Driven Clud Security Guidelines Orchestratin Secure Clud Strage Dem 1: Strage and Prcessing f Sensitive Data Dem 2: Hsting Critical Urban Mbility Services SECCRIT Cnsrtium 10

8 Key Objectives Activities & Output Legal Guidance n Data Prtectin and Evidence Understand and manage risk assciated with clud envirnments Understand clud behavir in the face f challenges Establish best practices fr secure clud service implementatins Demnstratin f utput in real-wrld applicatin scenaris Definitin f legal guidance n SLA cmpliance, prvisin f evidence, and data prtectin fr clud services Risk Assessment and Management Methdlgy Plicy Specificatin Methdlgy and Tl Clud Assurance Prfile and Evaluatin Methd Anmaly Detectin Techniques and Tls Plicy Decisin and Enfrcement Tls Clud Resilience Management Framewrk Tls fr Audit Trails and Rt Cause Analysis Mdel Driven Clud Security Guidelines Orchestratin Secure Clud Strage Dem 1: Strage and Prcessing f Sensitive Data Dem 2: Hsting Critical Urban Mbility Services Please nte, Clrs describe clustered SECCRIT Research Output SECCRIT Cnsrtium 11

9 SECCRIT Outputs SECCRIT Cnsrtium 13

10 Cmmn Terminlgy - SECCRIT Architecture R. Bless, Flittner, M., Hrneber, J., Hutchisn, D., Jung, C., Pallas, F., Schöller, M., Shirazi, S. Nr ul Ha, Simpsn, S., and Smith, P., Whitepaper "AF 1.0" SECCRIT Architectural Framewrk (and IEEE CludCm) SECCRIT Cnsrtium 14

11 SECCRIT Demnstratr: Public Safety (CCTV) MetrSub CitySec TelCm TenSys CludCrp The Subway Operatr The Security Service Prvider The Telecm Operatr The Tenant System Mgmt The Clud Mgmt Prvider SECCRIT Cnsrtium 15

12 SECCRIT Demnstratr: Traffic Cntrl Gather traffic data frm traffic sensrs n the rad OPERATOR Stre traffic data in data bases Generate data and reprts abut traffic status and traffic evlutin Analyse and relate the whle f mbility data Supprt t define mbility plices and traffic cntrl strategies Cntrl traffic n the rad by Traffic Cntrllers, Traffic Ligths, Variable Messages Signals, etc. Incidents Surveillance VIDEO SURVEILLANCE AUTOMATIC INCIDENTS DETECTION Actins Actins Incidents PUBLIC INFORMATION CONTROL SCHEDULED ACTIONS Actins Actins EXPERT SYSTEM Incidents Actins TRAFFIC CONTROL SDCTU STRATEGIC CONTROL Public transprtatin pririty by strategies like ffering traffic lights pririty Execute traffic cntrl strategies by peratrs manual actins r by autmatic prcedures SECCRIT Cnsrtium 16

13 Bard Members, wh supprt SECCRIT Mre SECCRIT Cnsrtium 17

14 SEcure Clud cmputing fr CRitical Infrastructure IT Cntact Dr. Markus Tauber M +43 (0) markus.tauber@ait.ac.at Austrian Institute f Technlgy (AIT) AIT Austrian Institute f Technlgy ETRA Investigación y Desarrll Fraunhfer Institute fr Experimental Sftware Engineering IESE Karlsruhe Institute f Technlgy NEC Eurpe Lancaster University Mirasys Hellenic Telecmmunicatins Organizatin OTE Ayuntamient de Valencia Amaris

How can security requirements of critical Infrastructure IT shape Cloud Computing research?

How can security requirements of critical Infrastructure IT shape Cloud Computing research? SEcure Clud cmputing fr CRitical Infrastructure IT Hw can security requirements f critical Infrastructure IT shape Clud Cmputing research? Dr. Markus Tauber markus.tauber@ait.ac.at Austrian Institute f

More information

Secure Cloud Computing for Critical Infrastructures

Secure Cloud Computing for Critical Infrastructures SEcure Cloud computing for CRitical Infrastructure IT Secure Cloud Computing for Critical Infrastructures Aleksandar Hudic and Christian Wagner AIT Austrian Institute of Technology AIT Austrian Institute

More information

High Assurance in Multi-Layer Cloud Infrastructures

High Assurance in Multi-Layer Cloud Infrastructures SEcure Cloud computing for CRitical Infrastructure IT High Assurance in Multi-Layer Cloud Infrastructures PhD Research Agenda[1] Austrian Institute of Technology (AIT) / Technical Univsersity of Vienna

More information

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

Cloud Inspector A Cooperative Tool to Increase Trust in Cloud Computing

Cloud Inspector A Cooperative Tool to Increase Trust in Cloud Computing SEcure computing for CRitical IT Inspector A Cooperative Tool to Increase Trust in Computing Roland Bless, Matthias Flittner, Robert Bauer Karlsruhe Institute of Technology (KIT) {bless, flittner, robert.bauer}@kit.edu

More information

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,

More information

2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY

2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY 2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY OFFICE OF INFORMATION TECHNOLOGY AUGUST 2008 Executive Summary The mst recent CSU Stanislaus infrmatin technlgy (IT) plan was issued in 2003.

More information

Build the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration

Build the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration Slutin Brief OpenStack Services OVERVIEW OnX understands clud adptin challenges f glbal enterprise cmpanies and helps Enterprises adpt OpenStack slutins thrugh targeted services. We ffer vertical industry

More information

Corporate Profile, 2014

Corporate Profile, 2014 Cpyright 2014 IT-Serve.cm All rights reserved. IT-Serve.cm Crprate Prfile, 2014 Internatinal experience, Reginal reach, Lcal understanding Dubai Abu Dhabi Sharjah Oman Qatar Saudi Arabia IT-Serve.cm PO

More information

Guidelines on Data Management in Horizon 2020

Guidelines on Data Management in Horizon 2020 Guidelines n Data Management in Hrizn 2020 Versin 1.0 11 December 2013 Guidelines n Data Management in Hrizn 2020 Versin 16 December 2013 Intrductin In Hrizn 2020 a limited pilt actin n pen access t research

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

SUNRISE. Building and Experimenting with the Internet of Underwater Things

SUNRISE. Building and Experimenting with the Internet of Underwater Things SUNRISE Building and Experimenting with the Internet f Underwater Things Chiara Petrili FP7 SUNRISE Prject Crdinatr University f Rme La Sapienza Rbert Petrccia University f Rme La Sapienza This prject

More information

Business Intelligence and DataWarehouse workshop

Business Intelligence and DataWarehouse workshop Business Intelligence and DataWarehuse wrkshp Benefits: Enables the Final year BE student/ Junir IT prfessinals t get a perfect blend f thery and practice n Business Intelligence and Data warehuse s as

More information

Cross Agency Priority Goal Quarterly Progress Update

Cross Agency Priority Goal Quarterly Progress Update Crss Agency Pririty Gal Quarterly Prgress Update Shared Services Gal Leaders: Krysta Harden, Deputy Secretary, US Department f Agriculture; Dave Mader, Cntrller, Office f Federal Financial Management,

More information

Professional Leaders/Specialists

Professional Leaders/Specialists Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and

More information

How To Write An Itu-T Security Standards Manual

How To Write An Itu-T Security Standards Manual ITU-T Netwrk Security Initiatives Michael Harrp The Cttingham Grup Internatinal Telecmmunicatin Unin Overview f Presentatin ITU-T Shw the cntext f ITU-T security standards activities Highlight sme f key

More information

ITIL Release Control & Validation (RCV) Certification Program - 5 Days

ITIL Release Control & Validation (RCV) Certification Program - 5 Days ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

Securely Managing Cryptographic Keys used within a Cloud Environment

Securely Managing Cryptographic Keys used within a Cloud Environment Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta sarbari@electrsft-inc.cm 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin

More information

How Does Cloud Computing Work?

How Does Cloud Computing Work? Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?

More information

Electronic and Information Resources Accessibility Compliance Plan

Electronic and Information Resources Accessibility Compliance Plan Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise

More information

LINCOLNSHIRE POLICE Policy Document

LINCOLNSHIRE POLICE Policy Document LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area

More information

SharePoint Governance

SharePoint Governance Explring the Myths, Risks and Realities f SharePint Gvernance AIIM Suthwest Chapter Octber 13, 2010 Renu Isaac 2009 Access Sciences Crpratin All rights reserved. 1 Agenda SharePint Gvernance Why Bther?

More information

Better Practice Guide Financial Considerations for Government use of Cloud Computing

Better Practice Guide Financial Considerations for Government use of Cloud Computing Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.

More information

Cross Agency Priority Goal Quarterly Progress Update

Cross Agency Priority Goal Quarterly Progress Update Crss Agency Pririty Gal Quarterly Prgress Update Shared Services Gal Leaders: Krysta Harden, Deputy Secretary, US Department f Agriculture; Dave Mader, Cntrller, Office f Federal Financial Management,

More information

Mobile Telecom Expense Management

Mobile Telecom Expense Management Mbile Telecm Expense Management Quick Start Mbile Telecm Expense Management Intrductin The BT Mbile Telecm Expense Management Quick Start Service is part BT Managed Mbility Expenses* BT s suite f telecm

More information

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System

ISO Management Systems. Guidance on understanding the benefits of an ISO Management System ISO Management Systems Guidance n understanding the benefits f an ISO Management System Welcme & Intrductins 4031 University Drive, 206, Fairfax, VA 22030 3 Grant Square, 243, Hinsdale, IL 60521 www.radiancmpliance.cm

More information

Security Assurance IN Service OuTSourcing (SAINTS)

Security Assurance IN Service OuTSourcing (SAINTS) Security Assurance IN Service OuTSurcing (SAINTS) Mussa OUEDRAOGO, PhD Service Science and Innvatin, CRP Henri Tudr Cnférence EurClud Luxemburg du 26 Fevrier 2013- Migrer vers le Clud Cmputing: pprtunités

More information

ITU-T IdMFG Framework Work Group

ITU-T IdMFG Framework Work Group ITU-T IdMFG Framewrk Wrk Grup Internatinal Telecmmunicatin Unin 1 Evlutin f Identity Management Presence (Inference frm vide cameras, RFID sensrs, etc.) Implicit Bimetrics (Key strkes, vice, face) Transparent

More information

Design for securability Applying engineering principles to the design of security architectures

Design for securability Applying engineering principles to the design of security architectures Design fr securability Applying engineering principles t the design f security architectures Amund Hunstad Phne number: + 46 13 37 81 18 Fax: + 46 13 37 85 50 Email: amund@fi.se Jnas Hallberg Phne number:

More information

ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days

ITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days ITIL V3 Planning, Prtectin and Optimizatin (PPO) Certificatin Prgram - 5 Days Prgram Overview The ITIL Intermediate Qualificatin: Planning, Prtectin and Optimizatin (PPO) Certificate is a free-standing

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Oracle Technology Service for Agile Cloud Projects. Copyright: 2014 6point6 Ltd

G-CLOUD FRAMEWORK SERVICE DEFINITION. Oracle Technology Service for Agile Cloud Projects. Copyright: 2014 6point6 Ltd G-CLOUD FRAMEWORK SERVICE DEFINITION Oracle Technlgy Service fr Agile Clud Prjects Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Oracle Technlgy 1. SERVICE OVERVIEW The 6pint6 Oracle Technlgy Service

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

Techno-Legal Motivation

Techno-Legal Motivation SEcure Cloud computing for CRitical Infrastructure IT Techno-Legal Motivation Ass. iur. Silvia Balaban 24/11/2015 AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute

More information

Magenta HR in partnership with breath ehr

Magenta HR in partnership with breath ehr BREATHEHR ONLINE HR SYSTEM AND PORTAL Magenta HR in partnership with breath ehr Magenta HR Cnsulting Ltd. 24 Canning Street, Edinburgh EH3 8EG Tel. 0131 2272769 www.magentahr.cm inf@magentahr.cm 6 December

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview

Security Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the

More information

Online Forensic Science Degree Programs

Online Forensic Science Degree Programs Online Schls, Degrees & Prgrams Blg Abut Archives Cntact Online Frensic Science Degree Prgrams Frensic science is an integral part f the investigatin f accidents and crimes. Students wh pursue nline Frensic

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future

In-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt

More information

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4

More information

How To Manage An Infrmatin Security Gvernance Prgram

How To Manage An Infrmatin Security Gvernance Prgram CCISO Ttal Duratin: 10 Days, 80 Hurs Dmain 1: Gvernance Qualifying areas under Dmain 1 include (but are nt limited t) the fllwing: Define, implement, manage and maintain an infrmatin security gvernance

More information

Duration of job. Context and environment: (e.g. dept description, region description, organogram)

Duration of job. Context and environment: (e.g. dept description, region description, organogram) Rle Prfile Jb Descriptin Jb Title Ref n: Prgramme Manager, Services fr Internatinal Educatin Marketing Directrate r Regin East Asia Department/Cuntry Indnesia Lcatin f pst Jakarta Pay Band G Reprts t Senir

More information

OnX is uniquely positioned to help your organization rapidly gain the necessary skills to enable the successful deployment of SDN.

OnX is uniquely positioned to help your organization rapidly gain the necessary skills to enable the successful deployment of SDN. Slutin Brief SDN Training OVERVIEW SDN is mving faster than previus netwrking advancements. Sme teams have already deplyed and are mnitring their envirnments, while thers are just starting t ask abut SDN

More information

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT

CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles

More information

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan Case Study Ananthakrishnan Snata develps J Architect, Snata Sftware cmprehensive BI Applicatin fr a leading prvider f Animal Nutritin Slutins Snata Sftware Limited www.snata-sftware.cm www.snata-sftware.cm

More information

Basics of Supply Chain Management

Basics of Supply Chain Management The Champlain Valley APICS Chapter is a premier prfessinal assciatin fr supply chain and peratins management and wrking tgether with the APICS rganizatin the leading prvider f research, educatin and certificatin

More information

Cloud Services Frequently Asked Questions FAQ

Cloud Services Frequently Asked Questions FAQ Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like

More information

Gregorio Martín Telefónica I+D

Gregorio Martín Telefónica I+D RESOURCE ALLOCATION IN DANGEROUS GOODS TRANSPORTATION ENVIRONMENTS Gregri Martín Telefónica I+D Safety as a key pririty 2 Imprving safety is an EC pririty (2003-2010 Eurpean Rad Safety Actin Prgramme).

More information

What is Software Risk Management? (And why should I care?)

What is Software Risk Management? (And why should I care?) What is Sftware Risk Management? (And why shuld I care?) Peter Kulik, KLCI, Inc. 1 st Editin, Octber 1996 Risks are schedule delays and cst verruns waiting t happen. As industry practices have imprved,

More information

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd. Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Organisational self-migration guide an overview V1-5 April 2014

Organisational self-migration guide an overview V1-5 April 2014 Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins

More information

THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6

THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track Case Management System (CMS) is a cnfigurable, brwser based case management system fr all levels

More information

Service Level Agreement in IBM T Clud - ITAP

Service Level Agreement in IBM T Clud - ITAP G-Clud Lt 4: Specialist Clud Services Service Definitin 100 Lngwater Avenue Green Park Reading Berkshire RG2 6GP Tel: 0118 9213 510 Email: gclud@dssec.c.uk Website: www.dssec.c.uk Intrductin Thank yu fr

More information

International Services Catalog Navigating the Security Landscape from Takeoff to Landing

International Services Catalog Navigating the Security Landscape from Takeoff to Landing Internatinal Services Catalg Navigating the Security Landscape frm Takeff t Landing Cpyright 2013 infrmatin security cnsulting All rights reserved Intrductin Infrmatin security cnsulting (i.s.c.) funded

More information

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012

Research Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012 Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.

More information

Research Report. Abstract: Data Center Networking Trends. January 2012. By Jon Oltsik With Bob Laliberte and Bill Lundell

Research Report. Abstract: Data Center Networking Trends. January 2012. By Jon Oltsik With Bob Laliberte and Bill Lundell Research Reprt Abstract: Data Center Netwrking Trends By Jn Oltsik With Bb Laliberte and Bill Lundell January 2012 2012 Enterprise Strategy Grup, Inc. All Rights Reserved. Intrductin Research Objective

More information

State of Wisconsin DET Agency Managed Virtual Services Service Offering Definition

State of Wisconsin DET Agency Managed Virtual Services Service Offering Definition State f Wiscnsin DET Agency Managed Virtual Services Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 6/03/08 1.0 James Sylla Initial draft 9/21/11 1.7 Amy Dustin Annual review

More information

Basic concept of Cloud computing

Basic concept of Cloud computing Basic cncept f Clud cmputing Abstract:- Mnica R Kabra (Vivekanand Arts Sardar Dalipsingh Cmmerce and science cllege Aurangabad) Clud cmputing is becming a pwerful netwrk architecture t perfrm large-scale

More information

Chapter 7 Business Continuity and Risk Management

Chapter 7 Business Continuity and Risk Management Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity

More information

Customer Support & Software Enhancements Policy

Customer Support & Software Enhancements Policy Custmer Supprt & Sftware Enhancements Plicy Welcme t Manhattan Assciates Custmer Supprt Organizatin (CSO). Staying current n Custmer Supprt & Sftware Enhancements and n a supprted versin f the licensed

More information

Job Profile Data & Reporting Analyst (Grant Fund)

Job Profile Data & Reporting Analyst (Grant Fund) Jb Prfile Data & Reprting Analyst (Grant Fund) Directrate Lcatin Reprts t Hurs Finance Slihull Finance Directr Nminally 37 hurs but peratinally available at all times t meet Cmpany requirements Cntract

More information

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013

Research Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013 Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,

More information

Releasing the potential of cloud computing in Europe Building the secure environment for big and small partners

Releasing the potential of cloud computing in Europe Building the secure environment for big and small partners Releasing the ptential f clud cmputing in Eurpe Building the secure envirnment fr big and small partners Dr. Ladislav Hudec, Assciate Prfessr http://www2.fiit.stuba.sk/~lhudec/ Faculty f Infrmatics and

More information

// Solution Brief. Pro-Active Support Services KARMA. Khipu Automated Remote Monitoring Application. Networks, Systems and Security Infrastructure

// Solution Brief. Pro-Active Support Services KARMA. Khipu Automated Remote Monitoring Application. Networks, Systems and Security Infrastructure // Slutin Brief Pr-Active Supprt Services KARMA Khipu Autmated Remte Mnitring Applicatin Netwrks, Systems and Security Infrastructure What is KARMA? KARMA Khipu Autmated Remte Mnitring Applicatin is a

More information

The Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment

The Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment The Whle f Gvernment Apprach: Mdels and Tls fr EGOV & Alignment Adegbyega Oj (in cllabratin with T. Janwski and E. Estevez) United Natins University a@iist.unu.edu OVERVIEW 1. THE WG APPROACH 2. APPLICATION

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Specialisation in Construction Management

Specialisation in Construction Management Subject: Specialisatin in Cnstructin Management Duratin: 3-5 th semester Status: The specialisatin f the elective curse f study ECTS credits: 25 Cntents f the elective curse f study: The elective Cnstructin

More information

Web Development the Next Steps

Web Development the Next Steps Web Develpment the Next Steps Significant prgress has been made n the redesign f the Western Washingtn University hme page. The ATUS Web Services team has wrked hard in cllabratin with the University Cmmunicatins

More information

Enterprise Security Management CIS 259

Enterprise Security Management CIS 259 Enterprise Security Management CIS 259 Prerequisites CIS 175 Descriptin This curse is designed t cver the managerial aspects f cmputer security and risk management fr enterprises. The student will attain

More information

DSS: tool for Europe-wide esignature interoperability. November 2015 Miguel Alvarez Rodríguez- ISA Unit

DSS: tool for Europe-wide esignature interoperability. November 2015 Miguel Alvarez Rodríguez- ISA Unit DSS: tl fr Eurpe-wide esignature interperability Nvember 2015 Miguel Alvarez Rdríguez- ISA Unit Cntext Services Directive bligatin n MS t make available administrative prcedures nline. Tw streams t facilitate

More information

ERP CONSULTING IT OUTSOURCING

ERP CONSULTING IT OUTSOURCING ERP CONSULTING IT OUTSOURCING IT Services www.bakertilly.pl ERP SYSTEMS ERP systems are mature tls managing resurces in every area f the cmpany management. The chice f this tl and a way f its implementatin

More information

JADU DATA PLATFORM SERVICE DEFINITION

JADU DATA PLATFORM SERVICE DEFINITION JADU DATA PLATFORM SERVICE DEFINITION Accessible structured data repsitries fr nline digital services, Data Platfrm by Jadu Jadu Limited Universe Huse 1 Merus Curt Leicester LE19 1RJ Telephne: 0116 222

More information

OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager

OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager JOB SPECIFICATION FUNCTION JOB TITLE REPORTING TO GRADE WORK PATTERN LOCATION IT & Digital Netwrk Services Analyst Netwrk Services Team Manager Band D Full-time Birmingham TRAVEL REQUIRED Occasinally ROLE

More information

Agenda. o Purpose of IT Assessment o Scope of IT Assessment o Deloitte Recommendations o IBM Discussions o Research Data Center o Open Season

Agenda. o Purpose of IT Assessment o Scope of IT Assessment o Deloitte Recommendations o IBM Discussions o Research Data Center o Open Season Agenda Purpse f IT Assessment Scpe f IT Assessment Delitte Recmmendatins IBM Discussins Research Data Center Open Seasn Purpse f IT Assessment Determine if IT resurces are being utilized efficiently and

More information

The ADVANTAGE of Cloud Based Computing:

The ADVANTAGE of Cloud Based Computing: The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has

More information

Delivering Business Value Through IT Cost Transparency Using IT CMF

Delivering Business Value Through IT Cost Transparency Using IT CMF Office f the CIO Delivering Business Value Thrugh IT Cst Transparency Using IT CMF Sharad Jshi Vice President, IT Business Management March 24 th, 2015 Abut the Depsitry Trust and Clearing Crpratin (DTCC)

More information

Infrastructure Management Services (IMS)

Infrastructure Management Services (IMS) Infrastructure Management Services (IMS) Table f Cntents Sr. N. Particulars Page N. 1 Abut Us 3 2 Infrastructure Management Services (IMS) 6 3 Remte Supprt Centre 8 4 Wrkplace Supprt 10 5 Data Centre Services

More information

How Smart City solutions contribute to increased security

How Smart City solutions contribute to increased security Hw Smart City slutins cntribute t increased security Prximus fr INNOS study day 20/01 Cntact: pascal.frenay@prximus.cm Smart City A buzz? Smart City Already Real Eurpe Natinal & reginal Cities & Twns What

More information

Sample Outline for Prelicensure Course in Nursing Informatics

Sample Outline for Prelicensure Course in Nursing Informatics Integrating AACN Essentials, QSEN KSA s and TIGER Cmpetencies fr Nursing Infrmatics Thmas R. Clancy, PhD, MBA, RN, FAAN Sample Outline fr Prelicensure Curse in Nursing Infrmatics Overall Curse Objectives

More information

General Information Project Title. Enterprise Service Management Reporting 7/3/2012 Project Manager Phone Email

General Information Project Title. Enterprise Service Management Reporting 7/3/2012 Project Manager Phone Email Prject Charter General Infrmatin Prject Title Date Enterprise Service Management Reprting 7/3/2012 Prject Phne Email Jdi Muller 415.476.2821 Jdi.Muller@ucsf.edu Executive Spnsr Phne Email Opinder Bawa

More information

MCSE Private Cloud Master Dos certificaciones en una, consigue el nivel experto en Cloud con el MCSA Windows Server + Pivate Cloud!

MCSE Private Cloud Master Dos certificaciones en una, consigue el nivel experto en Cloud con el MCSA Windows Server + Pivate Cloud! MCSE Private Clud Master Ds certificacines en una, cnsigue el nivel expert en Clud cn el MCSA Windws Server + Pivate Clud! Prgrama MCSA Windws Server 2012 (60 hras) MOC-20410: Installing and Cnfiguring

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

CNS-205: Citrix NetScaler 11 Essentials and Networking

CNS-205: Citrix NetScaler 11 Essentials and Networking CNS-205: Citrix NetScaler 11 Essentials and Netwrking Overview The bjective f the Citrix NetScaler 11 Essentials and Netwrking curse is t prvide the fundatinal cncepts and skills necessary t implement,

More information

BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitioner Level) Specific Role Data Architect

BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitioner Level) Specific Role Data Architect BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitiner Level) Specific Rle Data Architect Grade Directrate Managed by BG13 (TBC) Business Change Senir Infrmatin Systems & Technlgy Architect

More information

Change Management Process For [Project Name]

Change Management Process For [Project Name] Management Prcess Fr [Prject Name] i 1 Intrductin The is fllwed during the Executin phase f the Prject Management Life Cycle, nce the prject has been frmally defined and planned. 1.1 What is a Management

More information

Internal Audit Charter and operating standards

Internal Audit Charter and operating standards Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw

More information

The Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud

The Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud SESSION ID: CDS-R02 The Secret Life f Data: Prtecting Sensitive Infrmatin, Mbile t Clud Dan Griffin President JW Secure, Inc. @JWSdan WWNSAD? Intelligence agencies have been public abut: Inevitability

More information

Interworks Cloud Platform Citrix CPSM Integration Specification

Interworks Cloud Platform Citrix CPSM Integration Specification Citrix CPSM Integratin Specificatin Cntents 1. Intrductin... 2 2. Activatin f the Integratin Layer... 3 3. Getting the Services Definitin... 4 3.1 Creating a Prduct Type per Lcatin... 5 3.2 Create Instance

More information

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.

Privacy Policy. The Central Equity Group understands how highly people value the protection of their privacy. Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive

More information

Solution. Industry. Challenges. Client Case Study. Legacy Systems too Costly to Maintain. Supply Chain Advantage. Delivered.

Solution. Industry. Challenges. Client Case Study. Legacy Systems too Costly to Maintain. Supply Chain Advantage. Delivered. Supply Chain Advantage. Delivered. Client Case Study MEBC Supprts the Federal Aviatin Administratin Manage Prject Risk during Majr ERP Implementatin thrugh Independent Verificatin and Validatin (IV&V)

More information

JOINT BOARD OF MODERATORS GUIDELINES FOR CHECKING OUTPUT STANDARDS OF DEGREE PROGRAMMES

JOINT BOARD OF MODERATORS GUIDELINES FOR CHECKING OUTPUT STANDARDS OF DEGREE PROGRAMMES JOINT BOARD OF MODERATORS GUIDELINES FOR CHECKING OUTPUT STANDARDS OF DEGREE PROGRAMMES 1. Intrductin 1.1 These Guidelines are fr higher educatin institutins (r ther educatinal establishments) prviding

More information

Enterprise Content Management Solutions. R. Gregory Tschida Chief Information Officer MN.IT Services @ Minnesota Department of Revenue

Enterprise Content Management Solutions. R. Gregory Tschida Chief Information Officer MN.IT Services @ Minnesota Department of Revenue Enterprise Cntent Management Slutins R. Gregry Tschida Chief Infrmatin Officer MN.IT Services @ Minnesta Department f Revenue 1 What is Enterprise Cntent Management (ECM)? Enterprise Cntent Management

More information

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel

More information

Recognition of Prior Learning (RPL) TAE40110 Certificate IV in Training and Assessment

Recognition of Prior Learning (RPL) TAE40110 Certificate IV in Training and Assessment Recgnitin f Prir Learning (RPL) TAE40110 Certificate IV in Training and Assessment What is RPL? RPL recgnises that yu may already have the skills and knwledge needed t meet natinal cmpetency standards.

More information

MS SQL SERVER. Course Catalog 2012-2013

MS SQL SERVER. Course Catalog 2012-2013 MS SQL SERVER Curse Catalg 2012-2013 Micrs SQL Server 2012 Administratin This class cnsists f hands-n training that fcus n the fundamentals f administering the SQL Server 2012 database engine. Participants

More information

Mobile Device Manager Admin Guide. Reports and Alerts

Mobile Device Manager Admin Guide. Reports and Alerts Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview

More information