How To Write A Secure Cloud Computing For Critical Infrastructure
|
|
- Ethan Wood
- 3 years ago
- Views:
Transcription
1 SEcure Clud cmputing fr CRitical Infrastructure IT Methds and Technlgies fr Secure Clud Cmputing fr Critical InfrastructureIT Dr Markus Tauber SECCRIT Crdinatr AIT Austrian Institute f Technlgy AIT Austrian Institute f Technlgy ETRA Investigación y Desarrll Fraunhfer Institute fr Experimental Sftware Engineering IESE Karlsruhe Institute f Technlgy NEC Eurpe Lancaster University Mirasys Hellenic Telecmmunicatins Organizatin OTE Ayuntamient de Valencia Amaris
2 Why we are here SECCRIT Intrductin Technical & Legal Mtivatins Applicatin f Research Outputs Increase the real-wrld implicatins via yu SECCRIT Cnsrtium 2
3 The SECCRIT Prject Research prject n secure Clud Cmputing fr critical infrastructure IT 10 Partners frm Austria, Finland, Germany, Greece, Spain and the UK. Prject budget 4.8 Mi, partly funded by EC FP7 Prgramme Prject duratin % f the prject cmpleted 25 public deliverables SECCRIT Cnsrtium 3
4 SECCRIT s Overall Gal analyse and evaluate clud cmputing with respect t security risks in sensitive envirnments i.e. critical infrastructures t develp Traffic Cntrl Public Safety (CCTV) methdlgies technlgies, best practices fr secure, trustwrthy, high assurance legal cmpliant clud cmputing envirnments fr critical infrastructure IT. Investigate real-wrld prblems SECCRIT Cnsrtium 5
5 Prblem Definitin High Level Everything ges clud Cnsumer data like ur s r phts (ggle mail and ther ggle services) Public administratin IT services Sn all kinds f applicatins (incl. Critical Infrastructure - CI) Requirements fr clud applicatins vary Cmmercial applicatins mainly fcus n scalability & elasticity Requirements in CI regarding: verall redundancy, data availability, authenticity, secure access, trust and prtectin f the citizens are typically higher than in cmmercial applicatins. Cmmn Users Requirements cnverge with what is CI standard What is the prblem? Clud services abstract ver used resurces, are paque and make it hard t determine technical reasns fr (security) failure and hence make the develpment f cuntermeasures This als implies, frm a legal perspective, that it is hard t determine wh s fault it is and t shw ne hasn t acted negligent SECCRIT Cnsrtium 6
6 Key Objectives Legal Guidance n Data Prtectin and Evidence Understand and manage risk assciated with clud envirnments Understand clud behavir in the face f challenges Establish best practices fr secure clud service implementatins Demnstratin f utput in real-wrld applicatin scenaris SECCRIT Cnsrtium 9
7 Key Objectives Activities & Output Legal Guidance n Data Prtectin and Evidence Understand and manage risk assciated with clud envirnments Understand clud behavir in the face f challenges Establish best practices fr secure clud service implementatins Demnstratin f utput in real-wrld applicatin scenaris Definitin f legal guidance n SLA cmpliance, prvisin f evidence, and data prtectin fr clud services Risk Assessment and Management Methdlgy Plicy Specificatin Methdlgy and Tl Clud Assurance Prfile and Evaluatin Methd Anmaly Detectin Techniques and Tls Plicy Decisin and Enfrcement Tls Clud Resilience Management Framewrk Tls fr Audit Trails and Rt Cause Analysis Mdel Driven Clud Security Guidelines Orchestratin Secure Clud Strage Dem 1: Strage and Prcessing f Sensitive Data Dem 2: Hsting Critical Urban Mbility Services SECCRIT Cnsrtium 10
8 Key Objectives Activities & Output Legal Guidance n Data Prtectin and Evidence Understand and manage risk assciated with clud envirnments Understand clud behavir in the face f challenges Establish best practices fr secure clud service implementatins Demnstratin f utput in real-wrld applicatin scenaris Definitin f legal guidance n SLA cmpliance, prvisin f evidence, and data prtectin fr clud services Risk Assessment and Management Methdlgy Plicy Specificatin Methdlgy and Tl Clud Assurance Prfile and Evaluatin Methd Anmaly Detectin Techniques and Tls Plicy Decisin and Enfrcement Tls Clud Resilience Management Framewrk Tls fr Audit Trails and Rt Cause Analysis Mdel Driven Clud Security Guidelines Orchestratin Secure Clud Strage Dem 1: Strage and Prcessing f Sensitive Data Dem 2: Hsting Critical Urban Mbility Services Please nte, Clrs describe clustered SECCRIT Research Output SECCRIT Cnsrtium 11
9 SECCRIT Outputs SECCRIT Cnsrtium 13
10 Cmmn Terminlgy - SECCRIT Architecture R. Bless, Flittner, M., Hrneber, J., Hutchisn, D., Jung, C., Pallas, F., Schöller, M., Shirazi, S. Nr ul Ha, Simpsn, S., and Smith, P., Whitepaper "AF 1.0" SECCRIT Architectural Framewrk (and IEEE CludCm) SECCRIT Cnsrtium 14
11 SECCRIT Demnstratr: Public Safety (CCTV) MetrSub CitySec TelCm TenSys CludCrp The Subway Operatr The Security Service Prvider The Telecm Operatr The Tenant System Mgmt The Clud Mgmt Prvider SECCRIT Cnsrtium 15
12 SECCRIT Demnstratr: Traffic Cntrl Gather traffic data frm traffic sensrs n the rad OPERATOR Stre traffic data in data bases Generate data and reprts abut traffic status and traffic evlutin Analyse and relate the whle f mbility data Supprt t define mbility plices and traffic cntrl strategies Cntrl traffic n the rad by Traffic Cntrllers, Traffic Ligths, Variable Messages Signals, etc. Incidents Surveillance VIDEO SURVEILLANCE AUTOMATIC INCIDENTS DETECTION Actins Actins Incidents PUBLIC INFORMATION CONTROL SCHEDULED ACTIONS Actins Actins EXPERT SYSTEM Incidents Actins TRAFFIC CONTROL SDCTU STRATEGIC CONTROL Public transprtatin pririty by strategies like ffering traffic lights pririty Execute traffic cntrl strategies by peratrs manual actins r by autmatic prcedures SECCRIT Cnsrtium 16
13 Bard Members, wh supprt SECCRIT Mre SECCRIT Cnsrtium 17
14 SEcure Clud cmputing fr CRitical Infrastructure IT Cntact Dr. Markus Tauber M +43 (0) markus.tauber@ait.ac.at Austrian Institute f Technlgy (AIT) AIT Austrian Institute f Technlgy ETRA Investigación y Desarrll Fraunhfer Institute fr Experimental Sftware Engineering IESE Karlsruhe Institute f Technlgy NEC Eurpe Lancaster University Mirasys Hellenic Telecmmunicatins Organizatin OTE Ayuntamient de Valencia Amaris
How can security requirements of critical Infrastructure IT shape Cloud Computing research?
SEcure Clud cmputing fr CRitical Infrastructure IT Hw can security requirements f critical Infrastructure IT shape Clud Cmputing research? Dr. Markus Tauber markus.tauber@ait.ac.at Austrian Institute f
More informationSecure Cloud Computing for Critical Infrastructures
SEcure Cloud computing for CRitical Infrastructure IT Secure Cloud Computing for Critical Infrastructures Aleksandar Hudic and Christian Wagner AIT Austrian Institute of Technology AIT Austrian Institute
More informationHigh Assurance in Multi-Layer Cloud Infrastructures
SEcure Cloud computing for CRitical Infrastructure IT High Assurance in Multi-Layer Cloud Infrastructures PhD Research Agenda[1] Austrian Institute of Technology (AIT) / Technical Univsersity of Vienna
More informationConfiguring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp
Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is
More informationResearch Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012
Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.
More informationCloud Inspector A Cooperative Tool to Increase Trust in Cloud Computing
SEcure computing for CRitical IT Inspector A Cooperative Tool to Increase Trust in Computing Roland Bless, Matthias Flittner, Robert Bauer Karlsruhe Institute of Technology (KIT) {bless, flittner, robert.bauer}@kit.edu
More informationAHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy
AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,
More information2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY
2008-2011 CSU STANISLAUS INFORMATION TECHNOLOGY PLAN SUMMARY OFFICE OF INFORMATION TECHNOLOGY AUGUST 2008 Executive Summary The mst recent CSU Stanislaus infrmatin technlgy (IT) plan was issued in 2003.
More informationBuild the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration
Slutin Brief OpenStack Services OVERVIEW OnX understands clud adptin challenges f glbal enterprise cmpanies and helps Enterprises adpt OpenStack slutins thrugh targeted services. We ffer vertical industry
More informationCorporate Profile, 2014
Cpyright 2014 IT-Serve.cm All rights reserved. IT-Serve.cm Crprate Prfile, 2014 Internatinal experience, Reginal reach, Lcal understanding Dubai Abu Dhabi Sharjah Oman Qatar Saudi Arabia IT-Serve.cm PO
More informationGuidelines on Data Management in Horizon 2020
Guidelines n Data Management in Hrizn 2020 Versin 1.0 11 December 2013 Guidelines n Data Management in Hrizn 2020 Versin 16 December 2013 Intrductin In Hrizn 2020 a limited pilt actin n pen access t research
More informationSystems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets
More informationSUNRISE. Building and Experimenting with the Internet of Underwater Things
SUNRISE Building and Experimenting with the Internet f Underwater Things Chiara Petrili FP7 SUNRISE Prject Crdinatr University f Rme La Sapienza Rbert Petrccia University f Rme La Sapienza This prject
More informationBusiness Intelligence and DataWarehouse workshop
Business Intelligence and DataWarehuse wrkshp Benefits: Enables the Final year BE student/ Junir IT prfessinals t get a perfect blend f thery and practice n Business Intelligence and Data warehuse s as
More informationCross Agency Priority Goal Quarterly Progress Update
Crss Agency Pririty Gal Quarterly Prgress Update Shared Services Gal Leaders: Krysta Harden, Deputy Secretary, US Department f Agriculture; Dave Mader, Cntrller, Office f Federal Financial Management,
More informationProfessional Leaders/Specialists
Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and
More informationHow To Write An Itu-T Security Standards Manual
ITU-T Netwrk Security Initiatives Michael Harrp The Cttingham Grup Internatinal Telecmmunicatin Unin Overview f Presentatin ITU-T Shw the cntext f ITU-T security standards activities Highlight sme f key
More informationITIL Release Control & Validation (RCV) Certification Program - 5 Days
ITIL Release Cntrl & Validatin (RCV) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management
More informationSession 9 : Information Security and Risk
INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin
More informationSecurely Managing Cryptographic Keys used within a Cloud Environment
Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta sarbari@electrsft-inc.cm 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin
More informationHow Does Cloud Computing Work?
Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?
More informationElectronic and Information Resources Accessibility Compliance Plan
Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise
More informationLINCOLNSHIRE POLICE Policy Document
LINCOLNSHIRE POLICE Plicy Dcument 1. POLICY IDENTIFICATION PAGE POLICY TITLE: ICT CHANGE & RELEASE MANAGEMENT POLICY POLICY REFERENCE NO: PD 186 POLICY OWNERSHIP: ACPO Cmmissining Officer: Prtfli / Business-area
More informationSharePoint Governance
Explring the Myths, Risks and Realities f SharePint Gvernance AIIM Suthwest Chapter Octber 13, 2010 Renu Isaac 2009 Access Sciences Crpratin All rights reserved. 1 Agenda SharePint Gvernance Why Bther?
More informationBetter Practice Guide Financial Considerations for Government use of Cloud Computing
Better Practice Guide Financial Cnsideratins fr Gvernment use f Clud Cmputing Nvember 2011 Intrductin Many Australian Gvernment agencies are in the prcess f cnsidering the adptin f clud-based slutins.
More informationCross Agency Priority Goal Quarterly Progress Update
Crss Agency Pririty Gal Quarterly Prgress Update Shared Services Gal Leaders: Krysta Harden, Deputy Secretary, US Department f Agriculture; Dave Mader, Cntrller, Office f Federal Financial Management,
More informationMobile Telecom Expense Management
Mbile Telecm Expense Management Quick Start Mbile Telecm Expense Management Intrductin The BT Mbile Telecm Expense Management Quick Start Service is part BT Managed Mbility Expenses* BT s suite f telecm
More informationISO Management Systems. Guidance on understanding the benefits of an ISO Management System
ISO Management Systems Guidance n understanding the benefits f an ISO Management System Welcme & Intrductins 4031 University Drive, 206, Fairfax, VA 22030 3 Grant Square, 243, Hinsdale, IL 60521 www.radiancmpliance.cm
More informationSecurity Assurance IN Service OuTSourcing (SAINTS)
Security Assurance IN Service OuTSurcing (SAINTS) Mussa OUEDRAOGO, PhD Service Science and Innvatin, CRP Henri Tudr Cnférence EurClud Luxemburg du 26 Fevrier 2013- Migrer vers le Clud Cmputing: pprtunités
More informationITU-T IdMFG Framework Work Group
ITU-T IdMFG Framewrk Wrk Grup Internatinal Telecmmunicatin Unin 1 Evlutin f Identity Management Presence (Inference frm vide cameras, RFID sensrs, etc.) Implicit Bimetrics (Key strkes, vice, face) Transparent
More informationDesign for securability Applying engineering principles to the design of security architectures
Design fr securability Applying engineering principles t the design f security architectures Amund Hunstad Phne number: + 46 13 37 81 18 Fax: + 46 13 37 85 50 Email: amund@fi.se Jnas Hallberg Phne number:
More informationITIL V3 Planning, Protection and Optimization (PPO) Certification Program - 5 Days
ITIL V3 Planning, Prtectin and Optimizatin (PPO) Certificatin Prgram - 5 Days Prgram Overview The ITIL Intermediate Qualificatin: Planning, Prtectin and Optimizatin (PPO) Certificate is a free-standing
More informationG-CLOUD FRAMEWORK SERVICE DEFINITION. Oracle Technology Service for Agile Cloud Projects. Copyright: 2014 6point6 Ltd
G-CLOUD FRAMEWORK SERVICE DEFINITION Oracle Technlgy Service fr Agile Clud Prjects Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Oracle Technlgy 1. SERVICE OVERVIEW The 6pint6 Oracle Technlgy Service
More informationState of Wisconsin. File Server Service Service Offering Definition
State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm
More informationPOLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014
State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)
More informationTechno-Legal Motivation
SEcure Cloud computing for CRitical Infrastructure IT Techno-Legal Motivation Ass. iur. Silvia Balaban 24/11/2015 AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute
More informationMagenta HR in partnership with breath ehr
BREATHEHR ONLINE HR SYSTEM AND PORTAL Magenta HR in partnership with breath ehr Magenta HR Cnsulting Ltd. 24 Canning Street, Edinburgh EH3 8EG Tel. 0131 2272769 www.magentahr.cm inf@magentahr.cm 6 December
More informationThe Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future
The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents
More informationSecurity Services. Service Description Version 1.00. Effective Date: 07/01/2012. Purpose. Overview
Security Services Service Descriptin Versin 1.00 Effective Date: 07/01/2012 Purpse This Enterprise Service Descriptin is applicable t Security Services ffered by the MN.IT Services and described in the
More informationOnline Forensic Science Degree Programs
Online Schls, Degrees & Prgrams Blg Abut Archives Cntact Online Frensic Science Degree Prgrams Frensic science is an integral part f the investigatin f accidents and crimes. Students wh pursue nline Frensic
More informationChange Management Process
Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses
More informationIn-House Counsel Day Priorities for 2012. Cloud Computing the benefits, potential risks and security for the future
In-Huse Cunsel Day Pririties fr 2012 Clud Cmputing the benefits, ptential risks and security fr the future Presented by David Richardsn Thursday 1 March 2012 WIN: What in-huse lawyers need Knwledge, supprt
More informationUC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments
Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4
More informationHow To Manage An Infrmatin Security Gvernance Prgram
CCISO Ttal Duratin: 10 Days, 80 Hurs Dmain 1: Gvernance Qualifying areas under Dmain 1 include (but are nt limited t) the fllwing: Define, implement, manage and maintain an infrmatin security gvernance
More informationDuration of job. Context and environment: (e.g. dept description, region description, organogram)
Rle Prfile Jb Descriptin Jb Title Ref n: Prgramme Manager, Services fr Internatinal Educatin Marketing Directrate r Regin East Asia Department/Cuntry Indnesia Lcatin f pst Jakarta Pay Band G Reprts t Senir
More informationOnX is uniquely positioned to help your organization rapidly gain the necessary skills to enable the successful deployment of SDN.
Slutin Brief SDN Training OVERVIEW SDN is mving faster than previus netwrking advancements. Sme teams have already deplyed and are mnitring their envirnments, while thers are just starting t ask abut SDN
More informationCASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT
CASSOWARY COAST REGIONAL COUNCIL POLICY ENTERPRISE RISK MANAGEMENT Plicy Number: 2.20 1. Authrity Lcal Gvernment Act 2009 Lcal Gvernment Regulatin 2012 AS/NZS ISO 31000-2009 Risk Management Principles
More informationCase Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan
Case Study Ananthakrishnan Snata develps J Architect, Snata Sftware cmprehensive BI Applicatin fr a leading prvider f Animal Nutritin Slutins Snata Sftware Limited www.snata-sftware.cm www.snata-sftware.cm
More informationBasics of Supply Chain Management
The Champlain Valley APICS Chapter is a premier prfessinal assciatin fr supply chain and peratins management and wrking tgether with the APICS rganizatin the leading prvider f research, educatin and certificatin
More informationCloud Services Frequently Asked Questions FAQ
Clud Services Frequently Asked Questins FAQ Revisin 1.0 6/05/2015 List f Questins Intrductin What is the Caradigm Intelligence Platfrm (CIP) clud? What experience des Caradigm have hsting prducts like
More informationGregorio Martín Telefónica I+D
RESOURCE ALLOCATION IN DANGEROUS GOODS TRANSPORTATION ENVIRONMENTS Gregri Martín Telefónica I+D Safety as a key pririty 2 Imprving safety is an EC pririty (2003-2010 Eurpean Rad Safety Actin Prgramme).
More informationWhat is Software Risk Management? (And why should I care?)
What is Sftware Risk Management? (And why shuld I care?) Peter Kulik, KLCI, Inc. 1 st Editin, Octber 1996 Risks are schedule delays and cst verruns waiting t happen. As industry practices have imprved,
More informationThis report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.
Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an
More informationInformation Services Hosting Arrangements
Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based
More informationOrganisational self-migration guide an overview V1-5 April 2014
Organisatinal self-migratin guide an verview V1-5 April 2014 Cpyright 2013, Health and Scial Care Infrmatin Centre. 1 Self Migratin t NHSmail an verview fr rganisatins Cntents Intrductin 3 1. Initial preparatins
More informationTHOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6
THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track Case Management System (CMS) is a cnfigurable, brwser based case management system fr all levels
More informationService Level Agreement in IBM T Clud - ITAP
G-Clud Lt 4: Specialist Clud Services Service Definitin 100 Lngwater Avenue Green Park Reading Berkshire RG2 6GP Tel: 0118 9213 510 Email: gclud@dssec.c.uk Website: www.dssec.c.uk Intrductin Thank yu fr
More informationInternational Services Catalog Navigating the Security Landscape from Takeoff to Landing
Internatinal Services Catalg Navigating the Security Landscape frm Takeff t Landing Cpyright 2013 infrmatin security cnsulting All rights reserved Intrductin Infrmatin security cnsulting (i.s.c.) funded
More informationResearch Report. Abstract: Security Management and Operations: Changes on the Horizon. July 2012
Research Reprt Abstract: Security Management and Operatins: Changes n the Hrizn By Jn Oltsik, Senir Principal Analyst With Kristine Ka and Jennifer Gahm July 2012 2012, The Enterprise Strategy Grup, Inc.
More informationResearch Report. Abstract: Data Center Networking Trends. January 2012. By Jon Oltsik With Bob Laliberte and Bill Lundell
Research Reprt Abstract: Data Center Netwrking Trends By Jn Oltsik With Bb Laliberte and Bill Lundell January 2012 2012 Enterprise Strategy Grup, Inc. All Rights Reserved. Intrductin Research Objective
More informationState of Wisconsin DET Agency Managed Virtual Services Service Offering Definition
State f Wiscnsin DET Agency Managed Virtual Services Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 6/03/08 1.0 James Sylla Initial draft 9/21/11 1.7 Amy Dustin Annual review
More informationBasic concept of Cloud computing
Basic cncept f Clud cmputing Abstract:- Mnica R Kabra (Vivekanand Arts Sardar Dalipsingh Cmmerce and science cllege Aurangabad) Clud cmputing is becming a pwerful netwrk architecture t perfrm large-scale
More informationChapter 7 Business Continuity and Risk Management
Chapter 7 Business Cntinuity and Risk Management Sectin 01 Business Cntinuity Management 070101 Initiating the Business Cntinuity Plan (BCP) Purpse: T establish the apprpriate level f business cntinuity
More informationCustomer Support & Software Enhancements Policy
Custmer Supprt & Sftware Enhancements Plicy Welcme t Manhattan Assciates Custmer Supprt Organizatin (CSO). Staying current n Custmer Supprt & Sftware Enhancements and n a supprted versin f the licensed
More informationJob Profile Data & Reporting Analyst (Grant Fund)
Jb Prfile Data & Reprting Analyst (Grant Fund) Directrate Lcatin Reprts t Hurs Finance Slihull Finance Directr Nminally 37 hurs but peratinally available at all times t meet Cmpany requirements Cntract
More informationResearch Report. Abstract: Advanced Malware Detection and Protection Trends. September 2013
Research Reprt Abstract: Advanced Malware Detectin and Prtectin Trends By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm, Senir Prject Manager September 2013 2013 by The Enterprise Strategy Grup,
More informationReleasing the potential of cloud computing in Europe Building the secure environment for big and small partners
Releasing the ptential f clud cmputing in Eurpe Building the secure envirnment fr big and small partners Dr. Ladislav Hudec, Assciate Prfessr http://www2.fiit.stuba.sk/~lhudec/ Faculty f Infrmatics and
More information// Solution Brief. Pro-Active Support Services KARMA. Khipu Automated Remote Monitoring Application. Networks, Systems and Security Infrastructure
// Slutin Brief Pr-Active Supprt Services KARMA Khipu Autmated Remte Mnitring Applicatin Netwrks, Systems and Security Infrastructure What is KARMA? KARMA Khipu Autmated Remte Mnitring Applicatin is a
More informationThe Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment
The Whle f Gvernment Apprach: Mdels and Tls fr EGOV & Alignment Adegbyega Oj (in cllabratin with T. Janwski and E. Estevez) United Natins University a@iist.unu.edu OVERVIEW 1. THE WG APPROACH 2. APPLICATION
More informationPersonal Data Security Breach Management Policy
Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner
More informationSpecialisation in Construction Management
Subject: Specialisatin in Cnstructin Management Duratin: 3-5 th semester Status: The specialisatin f the elective curse f study ECTS credits: 25 Cntents f the elective curse f study: The elective Cnstructin
More informationWeb Development the Next Steps
Web Develpment the Next Steps Significant prgress has been made n the redesign f the Western Washingtn University hme page. The ATUS Web Services team has wrked hard in cllabratin with the University Cmmunicatins
More informationEnterprise Security Management CIS 259
Enterprise Security Management CIS 259 Prerequisites CIS 175 Descriptin This curse is designed t cver the managerial aspects f cmputer security and risk management fr enterprises. The student will attain
More informationDSS: tool for Europe-wide esignature interoperability. November 2015 Miguel Alvarez Rodríguez- ISA Unit
DSS: tl fr Eurpe-wide esignature interperability Nvember 2015 Miguel Alvarez Rdríguez- ISA Unit Cntext Services Directive bligatin n MS t make available administrative prcedures nline. Tw streams t facilitate
More informationERP CONSULTING IT OUTSOURCING
ERP CONSULTING IT OUTSOURCING IT Services www.bakertilly.pl ERP SYSTEMS ERP systems are mature tls managing resurces in every area f the cmpany management. The chice f this tl and a way f its implementatin
More informationJADU DATA PLATFORM SERVICE DEFINITION
JADU DATA PLATFORM SERVICE DEFINITION Accessible structured data repsitries fr nline digital services, Data Platfrm by Jadu Jadu Limited Universe Huse 1 Merus Curt Leicester LE19 1RJ Telephne: 0116 222
More informationOFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager
JOB SPECIFICATION FUNCTION JOB TITLE REPORTING TO GRADE WORK PATTERN LOCATION IT & Digital Netwrk Services Analyst Netwrk Services Team Manager Band D Full-time Birmingham TRAVEL REQUIRED Occasinally ROLE
More informationAgenda. o Purpose of IT Assessment o Scope of IT Assessment o Deloitte Recommendations o IBM Discussions o Research Data Center o Open Season
Agenda Purpse f IT Assessment Scpe f IT Assessment Delitte Recmmendatins IBM Discussins Research Data Center Open Seasn Purpse f IT Assessment Determine if IT resurces are being utilized efficiently and
More informationThe ADVANTAGE of Cloud Based Computing:
The ADVANTAGE f Clud Based Cmputing: A Web Based Slutin fr: Business wners and managers that perate equipment rental, sales and/r service based rganizatins. R M I Crpratin Business Reprt RMI Crpratin has
More informationDelivering Business Value Through IT Cost Transparency Using IT CMF
Office f the CIO Delivering Business Value Thrugh IT Cst Transparency Using IT CMF Sharad Jshi Vice President, IT Business Management March 24 th, 2015 Abut the Depsitry Trust and Clearing Crpratin (DTCC)
More informationInfrastructure Management Services (IMS)
Infrastructure Management Services (IMS) Table f Cntents Sr. N. Particulars Page N. 1 Abut Us 3 2 Infrastructure Management Services (IMS) 6 3 Remte Supprt Centre 8 4 Wrkplace Supprt 10 5 Data Centre Services
More informationHow Smart City solutions contribute to increased security
Hw Smart City slutins cntribute t increased security Prximus fr INNOS study day 20/01 Cntact: pascal.frenay@prximus.cm Smart City A buzz? Smart City Already Real Eurpe Natinal & reginal Cities & Twns What
More informationSample Outline for Prelicensure Course in Nursing Informatics
Integrating AACN Essentials, QSEN KSA s and TIGER Cmpetencies fr Nursing Infrmatics Thmas R. Clancy, PhD, MBA, RN, FAAN Sample Outline fr Prelicensure Curse in Nursing Infrmatics Overall Curse Objectives
More informationGeneral Information Project Title. Enterprise Service Management Reporting 7/3/2012 Project Manager Phone Email
Prject Charter General Infrmatin Prject Title Date Enterprise Service Management Reprting 7/3/2012 Prject Phne Email Jdi Muller 415.476.2821 Jdi.Muller@ucsf.edu Executive Spnsr Phne Email Opinder Bawa
More informationMCSE Private Cloud Master Dos certificaciones en una, consigue el nivel experto en Cloud con el MCSA Windows Server + Pivate Cloud!
MCSE Private Clud Master Ds certificacines en una, cnsigue el nivel expert en Clud cn el MCSA Windws Server + Pivate Clud! Prgrama MCSA Windws Server 2012 (60 hras) MOC-20410: Installing and Cnfiguring
More informationVersion: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013
Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch
More informationCNS-205: Citrix NetScaler 11 Essentials and Networking
CNS-205: Citrix NetScaler 11 Essentials and Netwrking Overview The bjective f the Citrix NetScaler 11 Essentials and Netwrking curse is t prvide the fundatinal cncepts and skills necessary t implement,
More informationBRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitioner Level) Specific Role Data Architect
BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitiner Level) Specific Rle Data Architect Grade Directrate Managed by BG13 (TBC) Business Change Senir Infrmatin Systems & Technlgy Architect
More informationChange Management Process For [Project Name]
Management Prcess Fr [Prject Name] i 1 Intrductin The is fllwed during the Executin phase f the Prject Management Life Cycle, nce the prject has been frmally defined and planned. 1.1 What is a Management
More informationInternal Audit Charter and operating standards
Internal Audit Charter and perating standards 2 1 verview This dcument sets ut the basis fr internal audit: (i) the Internal Audit charter, which establishes the framewrk fr Internal Audit; and (ii) hw
More informationThe Secret Life of Data: Protecting Sensitive Information, Mobile to Cloud
SESSION ID: CDS-R02 The Secret Life f Data: Prtecting Sensitive Infrmatin, Mbile t Clud Dan Griffin President JW Secure, Inc. @JWSdan WWNSAD? Intelligence agencies have been public abut: Inevitability
More informationInterworks Cloud Platform Citrix CPSM Integration Specification
Citrix CPSM Integratin Specificatin Cntents 1. Intrductin... 2 2. Activatin f the Integratin Layer... 3 3. Getting the Services Definitin... 4 3.1 Creating a Prduct Type per Lcatin... 5 3.2 Create Instance
More informationPrivacy Policy. The Central Equity Group understands how highly people value the protection of their privacy.
Privacy Plicy The Central Equity Grup understands hw highly peple value the prtectin f their privacy. Fr that reasn, the Central Equity Grup takes particular care in dealing with any persnal and sensitive
More informationSolution. Industry. Challenges. Client Case Study. Legacy Systems too Costly to Maintain. Supply Chain Advantage. Delivered.
Supply Chain Advantage. Delivered. Client Case Study MEBC Supprts the Federal Aviatin Administratin Manage Prject Risk during Majr ERP Implementatin thrugh Independent Verificatin and Validatin (IV&V)
More informationJOINT BOARD OF MODERATORS GUIDELINES FOR CHECKING OUTPUT STANDARDS OF DEGREE PROGRAMMES
JOINT BOARD OF MODERATORS GUIDELINES FOR CHECKING OUTPUT STANDARDS OF DEGREE PROGRAMMES 1. Intrductin 1.1 These Guidelines are fr higher educatin institutins (r ther educatinal establishments) prviding
More informationEnterprise Content Management Solutions. R. Gregory Tschida Chief Information Officer MN.IT Services @ Minnesota Department of Revenue
Enterprise Cntent Management Slutins R. Gregry Tschida Chief Infrmatin Officer MN.IT Services @ Minnesta Department f Revenue 1 What is Enterprise Cntent Management (ECM)? Enterprise Cntent Management
More informationCLOUD COMPUTING: SECURITY THREATS AND MECHANISM
CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel
More informationRecognition of Prior Learning (RPL) TAE40110 Certificate IV in Training and Assessment
Recgnitin f Prir Learning (RPL) TAE40110 Certificate IV in Training and Assessment What is RPL? RPL recgnises that yu may already have the skills and knwledge needed t meet natinal cmpetency standards.
More informationMS SQL SERVER. Course Catalog 2012-2013
MS SQL SERVER Curse Catalg 2012-2013 Micrs SQL Server 2012 Administratin This class cnsists f hands-n training that fcus n the fundamentals f administering the SQL Server 2012 database engine. Participants
More informationMobile Device Manager Admin Guide. Reports and Alerts
Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview
More information