How can security requirements of critical Infrastructure IT shape Cloud Computing research?

Size: px
Start display at page:

Download "How can security requirements of critical Infrastructure IT shape Cloud Computing research?"

Transcription

1 SEcure Clud cmputing fr CRitical Infrastructure IT Hw can security requirements f critical Infrastructure IT shape Clud Cmputing research? Dr. Markus Tauber [email protected] Austrian Institute f Technlgy (AIT) 25/04/2013 AIT Austrian Institute f Technlgy ETRA Investigación y Desarrll Fraunhfer Institute fr Experimental Sftware Engineering IESE Karlsruhe Institute f Technlgy NEC Eurpe Lancaster University Mirasys Hellenic Telecmmunicatins Organizatin OTE Ayuntamient de Valencia Amaris

2 What d we mean when we say: Clud Private Public Elasticity Scalability Critical Infrastructure Legal Requirements EU data prtectin SLA Clud Behaviur Resilience Anmaly Detectin Security and Safety Cludificatin SECCRIT Cnsrtium 2

3 Prblem Definitin Everything ges clud Cnsumer data like ur s r phts (ggle mail and ther ggle services) Data base applicatins, especially when expsed t unpredictable lad peaks Gvernmental Data Centres peer with each ther and create private cluds Sn all kinds f applicatins (inc. CI) withut us nticing it. Requirements fr clud applicatins vary Cmmercial nes mainly t deal with lad peaks and t get n-demand hardware resurces (scalability & elasticity) Requirements in CI regarding verall redundancy, data availability, authenticity, secure access are typically higher than in cmmercial applicatins. What is the prblem? Clud services are per definitin paque and make it hard t determine reasns fr failure and hence make the develpment f cuntermeasures hard This als implies that it is hard t determine wh s fault it is SECCRIT Cnsrtium 3

4 CI in the Clud Regulatry Issues Safety Issues (unlike ther clud services CI failure results in catastrphe, cascading effects) Security Issues Resilience's Issues Legal Issues EU Data Prtectin Stringent Regulatry Requirements Which data needs what level f prtectin Increased Awareness and visibility 7/24 availability Cnvergence f user cncerns and CI pririties SECCRIT Cnsrtium 4

5 Key Research Prblems Prvisin f legal guidance fr the use f technical infrmatin in matters f evidence and data prtectin as well as fr SLA Management Nvel Risk Management Appraches and Risk Metrics (inc. Catalgues) fr CI in Clud Envirnments Understanding Clud Behaviur (mnitring, frensic analysis, anmaly detectin, rt cause analysis, resilience analysis in varius layers) Best practise fr secure clud service implementatin in (e.g evaluating methds like cmmn criteria fr cludifying CI sftware) SECCRIT Cnsrtium 5

6 The SECCRIT Prject Why SECCRIT & why CI Cmmercial fcus mre n elasticity & scalability CI has higher interest in security aspects and redundancy Cmmercial user requirements cnverge with CI regulatry requirements Our utput benefits the user and can be applied t cmmercial cluds as well Highly user driven prject including user and advisry bard and real wrld dems What is SECCRIT 10 Partners frm Austria, Finland, Germany, Greece, Spain and the UK. Prject budget 4.8 Mi, partly funded by EC FP7 prgramme Prject duratin SECCRIT Cnsrtium 6

7 SEcure Clud cmputing fr CRitical Infrastructure IT Cntact Dr. Markus Tauber M +43 (0) [email protected] Austrian Institute f Technlgy (AIT) AIT Austrian Institute f Technlgy ETRA Investigación y Desarrll Fraunhfer Institute fr Experimental Sftware Engineering IESE Karlsruhe Institute f Technlgy NEC Eurpe Lancaster University Mirasys Hellenic Telecmmunicatins Organizatin OTE Ayuntamient de Valencia Amaris

How To Write A Secure Cloud Computing For Critical Infrastructure

How To Write A Secure Cloud Computing For Critical Infrastructure SEcure Clud cmputing fr CRitical Infrastructure IT Methds and Technlgies fr Secure Clud Cmputing fr Critical InfrastructureIT Dr Markus Tauber SECCRIT Crdinatr AIT Austrian Institute f Technlgy AIT Austrian

More information

High Assurance in Multi-Layer Cloud Infrastructures

High Assurance in Multi-Layer Cloud Infrastructures SEcure Cloud computing for CRitical Infrastructure IT High Assurance in Multi-Layer Cloud Infrastructures PhD Research Agenda[1] Austrian Institute of Technology (AIT) / Technical Univsersity of Vienna

More information

Cloud Inspector A Cooperative Tool to Increase Trust in Cloud Computing

Cloud Inspector A Cooperative Tool to Increase Trust in Cloud Computing SEcure computing for CRitical IT Inspector A Cooperative Tool to Increase Trust in Computing Roland Bless, Matthias Flittner, Robert Bauer Karlsruhe Institute of Technology (KIT) {bless, flittner, robert.bauer}@kit.edu

More information

Secure Cloud Computing for Critical Infrastructures

Secure Cloud Computing for Critical Infrastructures SEcure Cloud computing for CRitical Infrastructure IT Secure Cloud Computing for Critical Infrastructures Aleksandar Hudic and Christian Wagner AIT Austrian Institute of Technology AIT Austrian Institute

More information

Techno-Legal Motivation

Techno-Legal Motivation SEcure Cloud computing for CRitical Infrastructure IT Techno-Legal Motivation Ass. iur. Silvia Balaban 24/11/2015 AIT Austrian Institute of Technology ETRA Investigación y Desarrollo Fraunhofer Institute

More information

Securely Managing Cryptographic Keys used within a Cloud Environment

Securely Managing Cryptographic Keys used within a Cloud Environment Securely Managing Cryptgraphic Keys used within a Clud Envirnment Dr. Sarbari Gupta [email protected] 703-437-9451 ext 12 2012 NIST Cryptgraphic Key Management Wrkshp September 10-11, 2012 Intrductin

More information

Security Assurance IN Service OuTSourcing (SAINTS)

Security Assurance IN Service OuTSourcing (SAINTS) Security Assurance IN Service OuTSurcing (SAINTS) Mussa OUEDRAOGO, PhD Service Science and Innvatin, CRP Henri Tudr Cnférence EurClud Luxemburg du 26 Fevrier 2013- Migrer vers le Clud Cmputing: pprtunités

More information

G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: 2014 6point6 Ltd

G-CLOUD FRAMEWORK SERVICE DEFINITION. Solution Architecture for Cloud Service. Copyright: 2014 6point6 Ltd G-CLOUD FRAMEWORK SERVICE DEFINITION Slutin Architecture fr Clud Service Cpyright: 2014 6pint6 Ltd G-Clud Service Definitin Slutin Architecture fr Clud Service 1. SERVICE OVERVIEW 6pint6 is an innvative

More information

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy AHLA C. Big Data, Clud Cmputing and the New Wrld Order fr Health Care Privacy Marti Arvin Chief Cmpliance Officer UCLA David Geffen Schl f Medicine Ls Angeles, CA Kirk J. Nahra Wiley Rein LLP Washingtn,

More information

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012

Research Report. Abstract: The Emerging Intersection Between Big Data and Security Analytics. November 2012 Research Reprt Abstract: The Emerging Intersectin Between Big Data and Security Analytics By Jn Oltsik, Senir Principal Analyst With Jennifer Gahm Nvember 2012 2012 by The Enterprise Strategy Grup, Inc.

More information

ERAC. Efficient and Robust Architecture for the big data Cloud. Tor Skeie

ERAC. Efficient and Robust Architecture for the big data Cloud. Tor Skeie ERAC Efficient and Rbust Architecture fr the big data Clud Tr Skeie Clud cmputing challenges Results f a survey amng enterprises, cnducted by IDC Surce: IDC Enterprise Panel 2009 Perfrmance requires pwer

More information

THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6

THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 THOMSON REUTERS C-TRACK CASE MANAGEMENT SYSTEM SOFTWARE AS A SERVICE SERVICE DEFINITION FOR G-CLOUD 6 C-Track Case Management System (CMS) is a cnfigurable, brwser based case management system fr all levels

More information

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM

CLOUD COMPUTING: SECURITY THREATS AND MECHANISM CLOUD COMPUTING: SECURITY THREATS AND MECHANISM Vaishali Jshi 1, Lakshmi 2, Vivek Gupta 3 1,2,3 Department f Cmputer Science Engineering, Acrplis Technical Campus, Indre ABSTRACT Clud cmputing is a mdel

More information

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments

UC4 AUTOMATED VIRTUALIZATION Intelligent Service Automation for Physical and Virtual Environments Fr mre infrmatin abut UC4 prducts please visit www.uc4.cm. UC4 AUTOMATED VIRTUALIZATION Intelligent Service Autmatin fr Physical and Virtual Envirnments Intrductin This whitepaper describes hw the UC4

More information

State of Wisconsin DET Agency Managed Virtual Services Service Offering Definition

State of Wisconsin DET Agency Managed Virtual Services Service Offering Definition State f Wiscnsin DET Agency Managed Virtual Services Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 6/03/08 1.0 James Sylla Initial draft 9/21/11 1.7 Amy Dustin Annual review

More information

Service Level Agreement in IBM T Clud - ITAP

Service Level Agreement in IBM T Clud - ITAP G-Clud Lt 4: Specialist Clud Services Service Definitin 100 Lngwater Avenue Green Park Reading Berkshire RG2 6GP Tel: 0118 9213 510 Email: [email protected] Website: www.dssec.c.uk Intrductin Thank yu fr

More information

Succession Planning & Leadership Development: Your Utility s Bridge to the Future

Succession Planning & Leadership Development: Your Utility s Bridge to the Future Successin Planning & Leadership Develpment: Yur Utility s Bridge t the Future Richard L. Gerstberger, P.E. TAP Resurce Develpment Grup, Inc. 4625 West 32 nd Ave Denver, CO 80212 ABSTRACT A few years ag,

More information

OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager

OFFICIAL JOB SPECIFICATION. Network Services Analyst. Network Services Team Manager JOB SPECIFICATION FUNCTION JOB TITLE REPORTING TO GRADE WORK PATTERN LOCATION IT & Digital Netwrk Services Analyst Netwrk Services Team Manager Band D Full-time Birmingham TRAVEL REQUIRED Occasinally ROLE

More information

Simplifying Big Data Integration A Software as a Service Approach ~ Preliminary Analysis and Design ~

Simplifying Big Data Integration A Software as a Service Approach ~ Preliminary Analysis and Design ~ The BigIaS Platfrm Simplifying Big Data Integratin A Sftware as a Service Apprach ~ Preliminary Analysis and Design ~ September 5 th, 2013 Sgndal, Nrway Dumitru Rman Claudia Daniela Pp Rxana Iana Rman

More information

State of Wisconsin. File Server Service Service Offering Definition

State of Wisconsin. File Server Service Service Offering Definition State f Wiscnsin File Server Service Service Offering Definitin Dcument Revisin Histry Date Versin Creatr Ntes 2/16/2008 1.0 JD Urfer First pass 2/16/2008 2.0 Tm Runge Editing changes 2/19/2009 2.1 Tm

More information

Systems Support - Extended

Systems Support - Extended 1 General Overview This is a Service Level Agreement ( SLA ) between and the Enterprise Windws Services t dcument: The technlgy services the Enterprise Windws Services prvides t the custmer. The targets

More information

Copernicus & Big Data: A Perspective from the European EO Services Industry. Geoff Sawyer: EARSC Secretary General

Copernicus & Big Data: A Perspective from the European EO Services Industry. Geoff Sawyer: EARSC Secretary General Cpernicus & Big Data: A Perspective frm the Eurpean EO Services Industry. Geff Sawyer: EARSC Secretary General What is EARSC? EARSC is a trade assciatin (NPO), funded in 1989, which represents cmpanies:

More information

FINANCE SCRUTINY SUB-COMMITTEE

FINANCE SCRUTINY SUB-COMMITTEE REPORT FOR: PERFORMANCE AND FINANCE SCRUTINY SUB-COMMITTEE Date f Meeting: 6 January 2015 Subject: Staff Survey and Sickness Absence Mnitring Results and Actin plans Respnsible Officer: Scrutiny Lead Member

More information

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Versin: Mdified By: Date: Apprved By: Date: 1.0 Michael Hawkins Octber 29, 2013 Dan Bwden Nvember 2013 Rule 4-004J Payment Card Industry (PCI) Patch Management (prpsed) 01.1 Purpse The purpse f the Patch

More information

Business Continuity Management Systems Foundation Training Course

Business Continuity Management Systems Foundation Training Course Certificatin criteria fr Business Cntinuity Management Systems Fundatin Training Curse CONTENTS 1. INTRODUCTION 2. LEARNING OBJECTIVES 3. ENABLING OBJECTIVES KNOWLEDGE & SKILLS 4. TRAINING METHODS 5. COURSE

More information

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp Cnfiguring, Mnitring and Deplying a Private Clud with System Center 2012 Bt Camp Length: 5 Days Technlgy: Micrsft System Center 2012 Delivery Methd: Instructr-led Hands-n Audience Prfile This curse is

More information

Session 9 : Information Security and Risk

Session 9 : Information Security and Risk INFORMATION STRATEGY Sessin 9 : Infrmatin Security and Risk Tharaka Tennekn B.Sc (Hns) Cmputing, MBA (PIM - USJ) POST GRADUATE DIPLOMA IN BUSINESS AND FINANCE 2014 Infrmatin Management Framewrk 2 Infrmatin

More information

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014

POLICY 1390 Information Technology Continuity of Business Planning Issued: June 4, 2009 Revised: June 12, 2014 State f Michigan POLICY 1390 Infrmatin Technlgy Cntinuity f Business Planning Issued: June 4, 2009 Revised: June 12, 2014 SUBJECT: APPLICATION: PURPOSE: CONTACT AGENCY: Plicy fr Infrmatin Technlgy (IT)

More information

How To Deal With A Data Breach In The European Law

How To Deal With A Data Breach In The European Law Data Prtectin: Regulating Cyber Security Jnathan Bamfrd Head f Strategic Liaisn Hw des DP regulatin affect cyber security? Data Prtectin Act 1998: apprpriate security Privacy and Electrnic Cmmunicatin

More information

Basics of Supply Chain Management

Basics of Supply Chain Management The Champlain Valley APICS Chapter is a premier prfessinal assciatin fr supply chain and peratins management and wrking tgether with the APICS rganizatin the leading prvider f research, educatin and certificatin

More information

Aim The aim of a communication plan states the overall goal of the communication effort.

Aim The aim of a communication plan states the overall goal of the communication effort. Develping a Cmmunicatin Plan- Aim Aim The aim f a cmmunicatin plan states the verall gal f the cmmunicatin effrt. Determining the Aim Ask yurself r yur team what the verall gal f the cmmunicatin plan is.

More information

Information Services Hosting Arrangements

Information Services Hosting Arrangements Infrmatin Services Hsting Arrangements Purpse The purpse f this service is t prvide secure, supprted, and reasnably accessible cmputing envirnments fr departments at DePaul that are in need f server-based

More information

Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies Vlume 2, Issue 11, Nvember 2014 Internatinal Jurnal f Advance Research in Cmputer Science and Management Studies Research Article / Survey Paper / Case Study Available nline at: www.ijarcsms.cm ISSN: 2321

More information

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN

GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Gvernment f Newfundland and Labradr Office f the Chief Infrmatin Officer Infrmatin Management Branch GUIDELINE INFORMATION MANAGEMENT (IM) PROGRAM PLAN Guideline (Definitin): OCIO Guidelines derive frm

More information

Professional Leaders/Specialists

Professional Leaders/Specialists Psitin Prfile Psitin Lcatin Reprting t Jb family Band BI/Infrmatin Manager Wellingtn Prfessinal Leaders/Specialists Band I Date February 2013 1. POSITION PURPOSE The purpse f this psitin is t: Lead and

More information

Plus500CY Ltd. Statement on Privacy and Cookie Policy

Plus500CY Ltd. Statement on Privacy and Cookie Policy Plus500CY Ltd. Statement n Privacy and Ckie Plicy Statement n Privacy and Ckie Plicy This website is perated by Plus500CY Ltd. ("we, us r ur"). It is ur plicy t respect the cnfidentiality f infrmatin and

More information

Helpdesk Services at the Executive Office of Energy and Environmental Affairs is defined as follows:

Helpdesk Services at the Executive Office of Energy and Environmental Affairs is defined as follows: 5. Helpdesk Services 5.1 Sectin Overview This sectin f the plan defines Helpdesk Services at EOEEA as well as the key ratinale and benefits f cnslidating Helpdesk Services. Descriptins f the baseline current

More information

Protection of Critical Infrastructure

Protection of Critical Infrastructure Prtectin f Critical Infrastructure Speaker: Mindaugas Razbadauskas Cmmunicatins Regulatry Authrity f the Republic f Lithuania 4-5 th Octber Belgrad Slide 1 f 22 Critical Infrastructure Prtectin Critical

More information

Workshop on Business Analysis

Workshop on Business Analysis Wrkshp n Business Analysis 1. Prgram Overview Three days Business Analysis wrkshp frm Raj InftechBiz Slutins prvides 360 degree view f all activities pertaining t Business Analysis functin. Business Analysis

More information

Growing Your Cloud Infrastructure: Planning, Design and Operation

Growing Your Cloud Infrastructure: Planning, Design and Operation w h i t e p a p e r p a g e 1 f 12 Grwing Yur Clud Infrastructure: Planning, Design and Operatin Abstract Clud cmputing services are expanding and evlving rapidly. But with this fast, largescale grwth

More information

Electronic and Information Resources Accessibility Compliance Plan

Electronic and Information Resources Accessibility Compliance Plan Electrnic and Infrmatin Resurces Accessibility Cmpliance Plan Intrductin The University f Nrth Texas at Dallas (UNTD) is cmmitted t prviding a wrk envirnment that affrds equal access and pprtunity t therwise

More information

The Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment

The Whole of Government Approach: Models and Tools for EGOV Strategy & Alignment The Whle f Gvernment Apprach: Mdels and Tls fr EGOV & Alignment Adegbyega Oj (in cllabratin with T. Janwski and E. Estevez) United Natins University [email protected] OVERVIEW 1. THE WG APPROACH 2. APPLICATION

More information

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan Case Study Ananthakrishnan Snata develps J Architect, Snata Sftware cmprehensive BI Applicatin fr a leading prvider f Animal Nutritin Slutins Snata Sftware Limited www.snata-sftware.cm www.snata-sftware.cm

More information

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days

ITIL Service Offerings & Agreement (SOA) Certification Program - 5 Days ITIL Service Offerings & Agreement (SOA) Certificatin Prgram - 5 Days Prgram Overview ITIL is a set f best practices guidance that has becme a wrldwide-adpted framewrk fr Infrmatin Technlgy Services Management

More information

Customer Support & Software Enhancements Policy

Customer Support & Software Enhancements Policy Custmer Supprt & Sftware Enhancements Plicy Welcme t Manhattan Assciates Custmer Supprt Organizatin (CSO). Staying current n Custmer Supprt & Sftware Enhancements and n a supprted versin f the licensed

More information

Towards Novel Certification Models in Cloud Infrastructures (the CUMULUS approach)

Towards Novel Certification Models in Cloud Infrastructures (the CUMULUS approach) Twards Nvel Certificatin Mdels in Clud Infrastructures (the CUMULUS apprach) Prfessr G. Spanudakis Schl f Infrmatics CSP Frum, 18-19 April 2013, Brussels Outline Clud Security Still a prblem? Prvider perspective

More information

OnX is uniquely positioned to help your organization rapidly gain the necessary skills to enable the successful deployment of SDN.

OnX is uniquely positioned to help your organization rapidly gain the necessary skills to enable the successful deployment of SDN. Slutin Brief SDN Training OVERVIEW SDN is mving faster than previus netwrking advancements. Sme teams have already deplyed and are mnitring their envirnments, while thers are just starting t ask abut SDN

More information

How To Measure Call Quality On Your Service Desk

How To Measure Call Quality On Your Service Desk Hw T Measure Call Quality On Yur Service Desk - 1 - Declaratin We believe the infrmatin in this dcument t be accurate, relevant and truthful based n ur experience and the infrmatin prvided t us t date.

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

Secure Outsourced Computation in a Multi-Tenant Cloud. Seny Kamara - Microsoft Research Mariana Raykova - Columbia

Secure Outsourced Computation in a Multi-Tenant Cloud. Seny Kamara - Microsoft Research Mariana Raykova - Columbia Secure Outsurced Cmputatin in a Multi-Tenant Clud Seny Kamara - Micrsft Research Mariana Raykva - Clumbia Outsurced Cmputatin (x, f ) f (x) IBM WCSC 2 The Clud IBM WCSC 3 Virtualized Servers App1 App2

More information

Enterprise Security Management CIS 259

Enterprise Security Management CIS 259 Enterprise Security Management CIS 259 Prerequisites CIS 175 Descriptin This curse is designed t cver the managerial aspects f cmputer security and risk management fr enterprises. The student will attain

More information

How Does Cloud Computing Work?

How Does Cloud Computing Work? Hw Des Clud Cmputing Wrk? Carl Mazzanti, CEO, emazzanti Technlgies IT Supprt and Clud Cmputing Services fr Small Business Hbken, NJ and NYC, 201-360- 4400 Owner [Pick the date] Hw des Clud Cmputing Wrk?

More information

Change Management Process For [Project Name]

Change Management Process For [Project Name] Management Prcess Fr [Prject Name] i 1 Intrductin The is fllwed during the Executin phase f the Prject Management Life Cycle, nce the prject has been frmally defined and planned. 1.1 What is a Management

More information

2 DAY TRAINING THE BASICS OF PROJECT MANAGEMENT

2 DAY TRAINING THE BASICS OF PROJECT MANAGEMENT 2 DAY TRAINING THE BASICS OF PROJECT MANAGEMENT BASICS f Prject management 1.1. Objectives All participants will learn abut prject-based wrking by getting hands-n experience f a number f techniques. The

More information

Represent New College Stamford at both national and regional events and serve on appropriate external committees.

Represent New College Stamford at both national and regional events and serve on appropriate external committees. JOB DESCRIPTION Pst: Reprts t: Respnsible fr: Executive Directr Partnerships & Skills Principal and Chief Executive Apprenticeship Develpment Manager Head f Marketing Business Sales Team Salary: Attractive

More information

Health and Safety Training and Supervision

Health and Safety Training and Supervision Intrductin: Health and Safety Training and Supervisin University f Nttingham is cmmitted t maintaining and develping standards f excellence in all aspects f its business. T that end, the University aspires

More information

Guidelines for Outsourcing, Offshoring, and Cloud Services

Guidelines for Outsourcing, Offshoring, and Cloud Services Preview Guidelines fr Outsurcing, Offshring, and Clud Services Frewrd Data security and data prtectin challenges arise in mst utsurcing and ffshring transactins, particularly where services are clud based.

More information

Erasmus+ Joint Master Degrees. (JMDs) EACEA Unit A.3. Date: in 12 pts

Erasmus+ Joint Master Degrees. (JMDs) EACEA Unit A.3. Date: in 12 pts Erasmus+ Jint Master Degrees (JMDs) EACEA Unit A.3 Date: in 12 pts Key Actin 1 Learning mbility f individuals - Higher Educatin - OPEN TO THE WORLD 1. Credit mbility Internatinal pening f Erasmus, mre

More information

AN ROINN OIDEACHAIS THE LEAVING CERTIFICATE

AN ROINN OIDEACHAIS THE LEAVING CERTIFICATE AN ROINN OIDEACHAIS THE LEAVING CERTIFICATE BUSINESS SYLLABUS (HIGHER LEVEL and ORDINARY LEVEL 1 Cntents Preamble (ii) 1. Intrductin 1 2. Structure f the syllabus 3 3. Business syllabus Peple in business

More information

JACK CROWLEY, PMP 3856 Mill Mount Drive Powhatan, Virginia 23139 804-245-0689 [email protected]

JACK CROWLEY, PMP 3856 Mill Mount Drive Powhatan, Virginia 23139 804-245-0689 jack@jackcrowley.com JACK CROWLEY, PMP 3856 Mill Munt Drive Pwhatan, Virginia 23139 804-245-0689 [email protected] SENIOR PROGRAM MANAGEMENT PROFILE Senir Prgram Manager with ver twenty years experience in prtfli-prgram-prject

More information

Direct Marketing Production Printing & Value-Added Services: A strategy for growth

Direct Marketing Production Printing & Value-Added Services: A strategy for growth A Queste Cmpany Direct Marketing Prductin Printing & Value-Added Services: A strategy fr grwth Prductin Printing & Media A Multi-Client Study Direct Marketing Prductin Printing & Value-Added Services:

More information