MSc Forensic Computing Project Proposal from Richard Howley

Size: px
Start display at page:

Download "MSc Forensic Computing Project Proposal from Richard Howley"

Transcription

1 Suggested title: MSc Forensic Computing Project Proposal from Richard Howley Forensic Tools and Techniques: A critical review of current and future professional practice. Digital forensics (DF) is a new profession that has developed rapidly over the last decade. It is presumed that this growth is a consequence of several related factors, such as: 1. Increased reliance on data and data processing systems 2. Increased provision for, and access to, computer/internet resources 3. Greater awareness of opportunities for abuse/misuse 4. Portability of digital resources and access 5. Etc. Responding to DF incidents has been largely reactive and localised. Digital forensic practitioners, usually from an IT security background, have bought with them the tools and techniques of IT security and applied them to DF. As yet no one has mapped the UK DF landscape with regard to who does what?, how and why'? This project seeks to address this knowledge gap.

2 Suggested title: MSc Forensic Computing Project Proposal from Richard Howley Open source.v. proprietary: A theoretical and practical evaluation. DF practitioners make extensive use of open source and self-developed tools to support their DF practise. At the same time as this there are a large number of propriety tools available in the market place that claim to provide a solution to our DF needs. By undertaking original empirical research this project will identify patterns of current practice in the UK DF field with regard to: 1. Who uses what and why? 2. Attitudes to open source and propriety DF software 3. How comprehensive are proprietary tools and what OS tools are used to plug identified gaps in coverage? 4. What are the most/least popular tools and why? 5. How are DF tools tested and verified within organisations? 6. Evaluating the effectiveness of current testing and verification strategies. 7. Etc. Software evaluation needed This project is likely to require a thorough review of the literature on software evaluation followed by the design of software testing lab experiments.

3 Suggested title: MSc Forensic Computing Project Proposal from Richard Howley Memory dump analysis: Techniques and practices and a template for improvement. As memory increases in size and the ability to acquire it as part of a DF investigation becomes normal we need to be able to explore and interpret memory data in a fast and reliable manner. Memory analysis is still regarded as relatively new and difficult to harvest meaningful information from. This project will: 1. Review current recommended (in the literature) strategies for acquiring and interpreting memory data. 2. Design and undertake original empirical research into current practices in memory forensics. 3. Examine the extent to which current professional practice matches (or not) the recommended strategies found in the literature. 4. Propose a template or set of analytical procedures to improve the process of memory analysis. These procedures must be grounded in your research finding and fully tested using a lab experimental design process. It is also expected that this project will involve primary research methods to collect and analyse data from individuals and lab experiments as a research process. A complete research report and associated research instruments. It is quite likely that this

4 MSc Forensic Computing Project Proposal from Richard Howley Suggested title: The practice of digital investigations a critical review and proposed improvements. We are a new profession and as such many of our procedures and practices are relatively new and are still evolving. This project seeks to establish current practices in the field of DF and to identify what the major challenges are expected to be in the next five years. It is also expected that current practitioners in DF will be able to offer an anticipated response to those challenges if and when they materialise.

5 MSc Forensic Computing Project Proposal from Richard Howley Suggested title: An empirical investigation into the role and place of forensic triage in IR. Triage is widely acknowledged today as a way of dealing with large data sets and limited time to acquire and analyse it which characterise modern incident response. There is, however, very little literature on what triage is, what tools can be used and how they are being used at present. This project addresses this knowledge gap. This project will also discover and document the attitudes and concerns of those responsible for, or currently considering, using triage as part of their IR procedures.

6 MSc Forensic Computing Project Proposal from Richard Howley Suggested title: Virtual forensics What are the challenges and are we ready? Virtualisation is widely seen as a technology with huge potential to transform the way we work with computers and as such the DF challenges are already being noted. Some toolkits already provide the means to acquire live and or deleted virtual machines and to analyse them in the same way we do ordinary machines, but it is expected that once larger virtual structures become commonplace the DF challenges will grow rapidly. This project will: 1. Map out the anticipated demand for and usage of virtualisation in organisations. 2. Identify the main security risks and DF responses that have been identified. 3. Evaluate the tools and techniques currently available in the DF field and assess the extent to which they will support us in facing the challenges of virtualisation. 4. Propose and validate new tools and procedures to better support the DF process in virtual environments.

7 Suggested title: MSc Forensic Computing Project Proposal from Richard Howley Windows live forensics: Best practice in tools and techniques. The importance of Windows as a platform cannot be overstated and as such there are a wide range of tools and techniques available to support Windows Live Forensics (WLF). The project will identify current professional practices in WLF, identify the range of tools used and document the rationale behind the use of certain tools. Once the most widely used tools and procedures are identified these will then be tested in a set of lab based experiments to ascertain whether the claims made for them, or the anticipated benefits are real.

8 MSc Forensic Computing Project Proposal from Richard Howley Suggested title: A critical review of [digital forensics] OR [Security] in the cloud. It is anticipated that the cloud is about to roll over us all and radically change the way we work and in particular the way we engage with data. This project will: 1. Identify, through a literature review and primary research, the perceived DF/Sec threats posed by the cloud. 2. Discover and document the preparation companies are putting into place in preparation for the cloud. 3. Identify and assess the changes that will need to be made to DF/Sec procedures to accommodate data processing in the cloud. 4. Propose a set of practices and procedures that will better support organisation meet the DF/Sec challenges faced when working in the cloud.

Fostering Incident Response and Digital Forensics Research

Fostering Incident Response and Digital Forensics Research Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel bruce.nikkel@ubs.com September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

ITIL applied to Network Operations

ITIL applied to Network Operations ITIL applied to Network Operations ITIL: Information Technology Infrastructure Library A set of specifications to help IT manager and FTE achieve good services delivery to their users ITIL provides a comprehensive

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

Edinburg Napier University. Cloud-based Digital Forensics Evaluation Test (D-FET) Platform

Edinburg Napier University. Cloud-based Digital Forensics Evaluation Test (D-FET) Platform Edinburg Napier University Cloud-based Digital Forensics Evaluation Test (D-FET) Platform Flavien Flandrin 6/10/2011 Executive Summary Digital forensics is nowadays commonly used to provide evidence in

More information

Analyzing HTTP/HTTPS Traffic Logs

Analyzing HTTP/HTTPS Traffic Logs Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that

More information

1. Understanding Big Data

1. Understanding Big Data Big Data and its Real Impact on Your Security & Privacy Framework: A Pragmatic Overview Erik Luysterborg Partner, Deloitte EMEA Data Protection & Privacy leader Prague, SCCE, March 22 nd 2016 1. 2016 Deloitte

More information

Occupational Disease Claims Practice MANAGING DISEASE LIABILITIES

Occupational Disease Claims Practice MANAGING DISEASE LIABILITIES Occupational Disease Claims Practice MANAGING DISEASE LIABILITIES Foreword 1 1. Introduction 2 2. Why should I hire Marsh? 3 3. Disease Liabilities Risk Management Tool 4 4. Marsh s Occupational Disease

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Inadequacies of Current Risk Controls for the Cloud

Inadequacies of Current Risk Controls for the Cloud Inadequacies of Current Risk Controls for the Cloud Name: Michael Goldsmith Michael Auty, Sadie Creese and Paul Hopkins Venue: CPSRT@CloudCom2010, Indianapolis Date: 2 December 2010 Research supported

More information

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not

More information

G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps

G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps 1 Table of Contents 1. Scope of our Services... 3 2. Approach... 4 3. Assets and Tools... 5 4. Outcomes...

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

Integrated Governance, Risk & Compliance for Academy Trusts

Integrated Governance, Risk & Compliance for Academy Trusts Integrated Governance, Risk & Compliance for Academy Trusts Context Every trust, regardless of size must have a governance, risk and compliance (GRC) process Trustees, Governors and Executives are now

More information

Industry. Head of Research Service Desk Institute

Industry. Head of Research Service Desk Institute Asset Management in the ITSM Industry Prepared by Daniel Wood Head of Research Service Desk Institute Sponsored by Declaration We believe the information in this document to be accurate, relevant and truthful

More information

How to gather and evaluate information

How to gather and evaluate information 09 May 2016 How to gather and evaluate information Chartered Institute of Internal Auditors Information is central to the role of an internal auditor. Gathering and evaluating information is the basic

More information

Landscape Ecology with Geographical Information Systems PGCert/PGDip/MSc

Landscape Ecology with Geographical Information Systems PGCert/PGDip/MSc SCHOOL OF SCIENCE Landscape Ecology with Geographical Information Systems PGCert/PGDip/MSc Medway Campus www.gre.ac.uk/science Why study this programme? In both the UK and overseas, the concept of landscape-scale

More information

1. Implementation of a testbed for testing Energy Efficiency by server consolidation using Vmware

1. Implementation of a testbed for testing Energy Efficiency by server consolidation using Vmware 1. Implementation of a testbed for testing Energy Efficiency by server consolidation using Vmware Cloud Data centers used by service providers for offering Cloud Computing services are one of the major

More information

Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools

Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools Implementing Digital Forensic Readiness for Cloud Computing Using Performance Monitoring Tools F.R. Van Staden and H.S. Venter University of Pretoria Abstract Cloud computing is a scalable, distributed

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Hands-On How-To Computer Forensics Training

Hands-On How-To Computer Forensics Training j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE

More information

BIG DATA TRIAGE & DIGITAL FORENSICS

BIG DATA TRIAGE & DIGITAL FORENSICS BIG DATA TRIAGE & DIGITAL FORENSICS Lead by Professor John Walker FRSA FBCS CITP ITPC CRISC MFSoc INTERGRAL SECURITY XSSURANCE LTD WHAT IS DATA TRIAGE & DIGITAL FORENSICS? Triage is a process used to assess

More information

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations

More information

CFIR - Finance IT 2015 Cyber security September 2015

CFIR - Finance IT 2015 Cyber security September 2015 www.pwc.dk Cyber security Audit. Tax. Consulting. Our global team and credentials Our team helps organisations understand dynamic cyber challenges, adapt and respond to risks inherent to their business

More information

CHECKLIST: ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES

CHECKLIST: ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES Cyber threats continue to rapidly evolve in frequency and sophistication, posing a constant and serious threat to business organisations

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

Advanced Digital Forensics ITP 475 (4 Units)

Advanced Digital Forensics ITP 475 (4 Units) Advanced Digital Forensics ITP 475 (4 Units) Description In 2007, the FBI reported that over 200 major companies reported a loss of over 60 million dollars due to computer crime. Computers are becoming

More information

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY HTTP://SCIENCE.HAMPTONU.EDU/COMPSCI/ The Master of Science in Information Assurance focuses on providing

More information

Implementing a CMS. First Steps. A Case Study by. Raymond Sneddon, National Australia Group September 2008. Version: 1.

Implementing a CMS. First Steps. A Case Study by. Raymond Sneddon, National Australia Group September 2008. Version: 1. Implementing a CMS First Steps A Case Study by, National Australia Group September 2008 Introduction...1 Spreadsheet Cells and Brain Cells...1 The Goal...2 Stage 1 Planning...2 Sponsorship...2 The Scope...2

More information

Programme Specification

Programme Specification Programme Specification Course record information Name and level of final award: MSc Cyber Security and Forensics Name and level of intermediate awards: Postgraduate Diploma in Cyber Security and Forensics

More information

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security focus in ABB: a Key issue 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division Cyber Security in ABB Agenda ABB introduction ABB Cyber

More information

BA (Honours) PSYCHOLOGY

BA (Honours) PSYCHOLOGY BA (Honours) PSYCHOLOGY BA (Honours) PSYCHOLOGY Why study Psychology at Strathclyde? Psychology is principally concerned with human behaviour. Through the scientific study of humans, psychology offers

More information

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: (wahlgren@dsv.su.se), 2: (stewart@dsv.su.se) ABSTRACT

More information

Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks

Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks Please cite this paper as: OECD (2012), Terms of Reference for the Review of the OECD Guidelines for the Security of Information Systems and Networks, OECD Digital Economy Papers, No. 210, OECD Publishing.

More information

Security Intelligence Services. Cybersecurity training. www.kaspersky.com

Security Intelligence Services. Cybersecurity training. www.kaspersky.com Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative

More information

IT Strategy Review April 2014

IT Strategy Review April 2014 IT Strategy Review April 2014 1. Executive Summary UCD IT Services developed a five year IT Strategy (2009-2013) and has now completed its implementation. The strategy set out key objectives for each area

More information

Programme Specification for the. Cardiff Metropolitan University. Master of Science (MSc) in Information Technology

Programme Specification for the. Cardiff Metropolitan University. Master of Science (MSc) in Information Technology LONDON SCHOOL OF COMMERCE Programme Specification for the Cardiff Metropolitan University Master of Science (MSc) in Information Technology Contents Programme Aims and Objectives 3 Programme Structure

More information

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.

More information

Psychology. Undergraduate

Psychology. Undergraduate Undergraduate Psychology Psychology encompasses a range of disciplines that share an interest in understanding how humans and other animals interpret and respond to their mental and physical world. It

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

Malware isn t The only Threat on Your Endpoints

Malware isn t The only Threat on Your Endpoints Malware isn t The only Threat on Your Endpoints Key Themes The cyber-threat landscape has Overview Cybersecurity has gained a much higher profile over the changed, and so have the past few years, thanks

More information

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs.

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs. CIBECS / IDG Connect 2014 DATA LOSS SURVEY The latest statistics and trends around user data protection for business. REPORT www.cibecs.com 2 Table of ontents EXECUTIVE 01 02 03 04 05 06 SUMMARY WHO PARTICIPATED

More information

Cyber Security and Digital Forensics Training Platform

Cyber Security and Digital Forensics Training Platform Cyber Security and Digital Forensics Training Platform Adrian Smales and Prof Bill Buchanan DFET Project Outline: DFET creates new training methods/techniques to support judicial authorities, law enforcement

More information

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT)

SOCIAL MEDIA MOBILE DEVICES CLOUD SERVICES INTERNET OF THINGS (IOT) INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981!

What is Cloud Computing? First, a little history. Demystifying Cloud Computing. Mainframe Era (1944-1978) Workstation Era (1968-1985) Xerox Star 1981! Demystifying Cloud Computing What is Cloud Computing? First, a little history. Tim Horgan Head of Cloud Computing Centre of Excellence http://cloud.cit.ie 1" 2" Mainframe Era (1944-1978) Workstation Era

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Guideline: Medical supervision of Diabetes Registered Nurse Prescribing 2014

Guideline: Medical supervision of Diabetes Registered Nurse Prescribing 2014 Guideline: Medical supervision of Diabetes Registered Nurse Prescribing 2014 The Nursing Council of New Zealand has adapted this Guideline which was developed by the New Zealand Society for the Study of

More information

Michelle Govan & Anand Philip Network & Security Engineering

Michelle Govan & Anand Philip Network & Security Engineering Michelle Govan & Anand Philip Network & Security Engineering Network & Security Engineering Suite Dr Michelle Govan Anand Philip Programme Philosophy The philosophy of the programmes is unique to others

More information

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time)

Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Higher Certificate in Information Systems (Network Engineering) * (1 year full-time, 2½ years part-time) Module: Computer Literacy Knowing how to use a computer has become a necessity for many people.

More information

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering Course Number HE20524 Location Meadowbank OVERVIEW OF SUBJECT REQUIREMENTS Note: This document

More information

www.itsis.co.uk www.itsis.co.uk

www.itsis.co.uk www.itsis.co.uk 3000+ workstations upgraded on time and budget Software and exchange update rolled out across all workstations Company technical standards implemented across 200 remote locations Specified to exceed software

More information

HOW ARE CONTACT CENTRES USING QUALITY MONITORING?

HOW ARE CONTACT CENTRES USING QUALITY MONITORING? 1 HOW ARE CONTACT CENTRES USING QUALITY MONITORING? REPORT COMPILED BY BUSINESS SYSTEMS (UK) LTD USING SURVEY RESULTS FROM OVER 100 CONTACT CENTRE PROFESSIONALS. 2 CONTENTS CONTENTS... 2 INTRODUCTION...

More information

Breach Found. Did It Hurt?

Breach Found. Did It Hurt? ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many

More information

Exemplars. Research Report

Exemplars. Research Report Exemplars Research Report Every effort has been made to trace and contact the authors of these works, but this has not been possible in every case. If notified, we will undertake to rectify any errors

More information

Cyber Security and the Impact on Banks in China

Cyber Security and the Impact on Banks in China Cyber Security and the Impact on Banks in China Regulatory Policy Development and Updates March 015 kpmg.com/cn Executive Summary The China Banking Regulatory Commission (CBRC) issued two circulars (Circulars

More information

Guidelines on continuing professional development

Guidelines on continuing professional development Guidelines on continuing professional development Introduction These guidelines 1 have been developed by the Psychology Board of Australia under s. 39 of the Health Practitioner Regulation National Law

More information

Workforce Planning & Development Model

Workforce Planning & Development Model Workforce Planning & Development Model Overview what is workforce planning? Workforce planning is an organised process for: Identifying the number of employees and the types of employee skill sets required

More information

Paper E-180314-? Appendix 1 Annex A

Paper E-180314-? Appendix 1 Annex A Comparison between the GCC s Degree Recognition Criteria (May 2010) and the Councils on Chiropractic Education International - International Chiropractic Accreditation Standards (2009) Introduction The

More information

A global infrastructure to safeguard your business_

A global infrastructure to safeguard your business_ Global Security Services A global infrastructure to safeguard your business_ Global Solutions More than just peace of mind: increase confidence and reduce risk across your entire organisation_ How do you

More information

FIVE BIG DATA SECURITY CONSIDERATIONS

FIVE BIG DATA SECURITY CONSIDERATIONS BIG DATA ANALYTICS IS A MULTI- BILLION-DOLLAR OPPORTUNITY AND KEEPING A FIRM HOLD ON INFORMATION SECURITY IS KEY FIVE BIG DATA SECURITY CONSIDERATIONS NO ONE DOUBTS THE POTENTIAL BUSINESS VALUE OF BIG

More information

White Paper: Cloud Security. Cloud Security

White Paper: Cloud Security. Cloud Security White Paper: Cloud Security Cloud Security Introduction Due to the increase in available bandwidth and technological advances in the area of virtualisation, and the desire of IT managers to provide dynamically

More information

TMMi Case Study. Methodology. Scope. Use TMMi to do a gap analysis for an independent

TMMi Case Study. Methodology. Scope. Use TMMi to do a gap analysis for an independent TMMi Case Study TMMi Case Study Presentation Use TMMi to do a gap analysis for an independent testing organisation Involves 2 assessors for 5 days Objectives Determine how well the organisation is meeting

More information

Qi Liu Rutgers Business School ISACA New York 2013

Qi Liu Rutgers Business School ISACA New York 2013 Qi Liu Rutgers Business School ISACA New York 2013 1 What is Audit Analytics The use of data analysis technology in Auditing. Audit analytics is the process of identifying, gathering, validating, analyzing,

More information

FIVE GOLDEN RULES FOR A SUCCESSFUL UBUNTU DESKTOP MIGRATION. An Ubuntu workbook from Canonical

FIVE GOLDEN RULES FOR A SUCCESSFUL UBUNTU DESKTOP MIGRATION. An Ubuntu workbook from Canonical FIVE GOLDEN RULES FOR A SUCCESSFUL UBUNTU DESKTOP MIGRATION An Ubuntu workbook from Canonical 2 INTRODUCTION So, you like the idea of deploying an Ubuntu desktop to all or some of your users. You like

More information

British Dental Association. Strategy

British Dental Association. Strategy British Dental Association Strategy 2015-2018 Foreword by Mick Armstrong, Chair of the Principal Executive Committee Put simply, a membership organisation is its members. And like all organisations financial

More information

Overview of Computer Forensics

Overview of Computer Forensics Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National

More information

INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT. October 2013. Sponsored by:

INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT. October 2013. Sponsored by: 2013 INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT & October 2013 & INFORMATION SECURITY CYBER LIABILITY RISK MANAGEMENT: The Third Annual Survey on the Current State of and Trends in Information

More information

Ten Deadly Sins of Computer Forensics

Ten Deadly Sins of Computer Forensics Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This

More information

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer

More information

[INSERT NAME OF SCHOOL] BUSINESS CONTINUITY PLAN

[INSERT NAME OF SCHOOL] BUSINESS CONTINUITY PLAN Plan Ref No: [INSERT NAME OF SCHOOL] BUSINESS CONTINUITY PLAN PLAN DETAILS Date Written Plan Owner Plan Writer Version Number Review Schedule 6 monthly Annually Date of Plan Review Date of Plan Exercise

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

GRADUATE CERTIFICATE IN ORGANISATIONAL DEVELOPMENT

GRADUATE CERTIFICATE IN ORGANISATIONAL DEVELOPMENT GRADUATE CERTIFICATE IN ORGANISATIONAL DEVELOPMENT Innovative, practical and relevant SIMON GOTT Graduate Certificate In Organisational Development Programme Director Organisations cannot truly thrive

More information

TOP 3. Reasons to Give Insiders a Unified Identity

TOP 3. Reasons to Give Insiders a Unified Identity TOP 3 Reasons to Give Insiders a Unified Identity Although much publicity around computer security points to hackers and other outside attacks, insider threats can be particularly insidious and dangerous,

More information

Cornwall Therapy Partnership. Graduate Certificate in Integrated Humanistic Psychotherapy

Cornwall Therapy Partnership. Graduate Certificate in Integrated Humanistic Psychotherapy Cornwall Therapy Partnership Graduate Certificate in Integrated Humanistic Psychotherapy This document contains the outlines of the details of the Graduate Certificate in Integrated Humanistic Psychotherapy

More information

Professional Marketing Qualifications

Professional Marketing Qualifications Professional Qualifications Smart and flexible qualifications from CIM Foundation Certificate in Certificate in Professional Diploma in Professional Chartered Postgraduate Diploma in Smart, flexible and

More information

Guidance Practices & Trends FTSE 100

Guidance Practices & Trends FTSE 100 Guidance Practices & Trends Research Report by EventVestor & IR Society October 2012 Guidance Practices and Trends - Highlights Less than 1 of companies provide quantitative EPS guidance. However, over

More information

Inside Track Research Note. In association with. Storage Quality of Service Management. The automation imperative

Inside Track Research Note. In association with. Storage Quality of Service Management. The automation imperative Research Note In association with Storage Quality of Service Management The automation imperative May 2015 In a nutshell About this The insights presented in this document are derived from independent

More information

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013

CAPABILITY STATEMENT LEGAL TECHNOLOGIES AND COMPUTER FORENSICS. www.controlrisks.com DECEMBER 2013 LEGAL TECHNOLOGIES AND COMPUTER FORENSICS DECEMBER 2013 Copyright Control Risks. All rights reserved. This document cannot be reproduced without the express written permission of Control Risks. Any reproduction

More information

Nottingham Trent University Course Specification

Nottingham Trent University Course Specification Nottingham Trent University Course Specification Basic Course Information 1. Awarding Institution: Nottingham Trent University 2. School/Campus: School of Social Sciences, City Campus 3. Final Award, Course

More information

2014 Authentication Survey Executive Summary. How Organizations Are Responding to Mobile and Cloud Threats

2014 Authentication Survey Executive Summary. How Organizations Are Responding to Mobile and Cloud Threats 2014 Authentication Survey Executive Summary How Organizations Are Responding to Mobile and Cloud Threats Overview As IT teams seek to keep sensitive assets safe, while supporting the evolving adoption

More information

IBM G-Cloud Application Systems Management as a Service

IBM G-Cloud Application Systems Management as a Service IBM G-Cloud Application Systems Management as a Service Service Definition 1 1. Summary 1.1 Service Description This offering is provided by IBM Global Business Services and provides a Systems Management

More information

The Internal Audit fraud challenge Prevention, protection, detection

The Internal Audit fraud challenge Prevention, protection, detection The Internal Audit fraud challenge Prevention, protection, detection Contents Introduction to survey 1 Key findings 2 What are the views of senior management? 3 Adequately resourced? 6 Current trends and

More information

National Information Assurance Partnership

National Information Assurance Partnership National Information Assurance Partnership TM Common Criteria Evaluation and Validation Scheme Validation Report Protection Profile for Software Full Disk Encryption, Version 1.1 Report Number: CCEVS-VR-PP-0003

More information

Private Cloud Deployment

Private Cloud Deployment Oracle Private Cloud Private Cloud Deployment ADOPTION BARRIERS, DEPLOYMENT LEVELS, CUSTOMER EXPERIENCES AND FUTURE PLANS FOR PRIVATE CLOUD Survey conducted by IDG Connect on behalf of Oracle IDG Connect,

More information

Master of Science. Public Health Nutrition

Master of Science. Public Health Nutrition Department of Clinical Sciences and Nutrition Master of Science in Public Health Nutrition Full-Time and Part-Time Taught Modular Masters Programme Module Descriptor Outlines 1 Short Module Descriptors

More information

The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology

The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology The big data dilemma an inquiry by the House of Commons Select Committee on Science and Technology Evidence from the UK Computing Research Committee Definitive. 1 September 2015 The UK Computing Research

More information

Cloud Computing Security Considerations

Cloud Computing Security Considerations Cloud Computing Security Considerations Roger Halbheer, Chief Security Advisor, Public Sector, EMEA Doug Cavit, Principal Security Strategist Lead, Trustworthy Computing, USA January 2010 1 Introduction

More information

What happens when you sign up to the ZoneFox Service?

What happens when you sign up to the ZoneFox Service? What happens when you sign up to the ZoneFox Service? Overview According to the highly respected Verizon 2014 Data Breach Investigations Report 1, 2013 set a new record for the number of data breaches

More information

How management accountants can grow their influence to drive business performance

How management accountants can grow their influence to drive business performance How management accountants can grow their influence to drive business performance 02 INTRODUCTION M any management accountants are not yet being engaged to exercise their potential to improve decision-making

More information

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

Secure your cloud applications by building solid foundations with enterprise (security ) architecture Supporting Business Agility Secure your cloud applications by building solid foundations with enterprise (security ) architecture Vladimir Jirasek, Managing director Jirasek Consulting Services & Research

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

MSc Management (Marketing) Programme Design. Academic Year 2014-15

MSc Management (Marketing) Programme Design. Academic Year 2014-15 MSc Management (Marketing) Programme Design Academic Year 2014-15 1 MSc Management (Marketing) The MSc Management programme is divided into three distinct sections: The first semester of taught courses

More information

IT SECURITY POLICY (ISMS 01)

IT SECURITY POLICY (ISMS 01) IT SECURITY POLICY (ISMS 01) NWAS IM&T Security Policy Page: Page 1 of 14 Date of Approval: 12.01.2015 Status: Final Date of Review Recommended by Approved by Information Governance Management Group Trust

More information

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE

2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE 2015 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE FOURTH ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2015 2015 Network Security & Cyber Risk Management: The FOURTH

More information

CESG Certification of Cyber Security Training Courses

CESG Certification of Cyber Security Training Courses CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security

More information

AUSTRALIAN ENGINEERING COMPETENCY STANDARDS STAGE 2 -

AUSTRALIAN ENGINEERING COMPETENCY STANDARDS STAGE 2 - AUSTRALIAN ENGINEERING COMPETENCY STANDARDS STAGE 2 - THE EXPERIENCED The Stage 2 Competency Standards are the profession's expression of the knowledge and skill base, engineering application abilities,

More information

Qualifications for the Fire Sector

Qualifications for the Fire Sector Qualifications for the Fire Sector 1 Contents 3 Why choose Pearson Work Based Learning and Colleges for fire sector qualifications 4 Qualifications Fire Safety 4 Fire and Rescue Services in the Community

More information