Electronic signature and compliance assurance: what s new?
|
|
|
- Jocelin Johns
- 10 years ago
- Views:
Transcription
1 Electronic signature and compliance assurance: what s new? Ignacio ( Nacho ) Alamillo Domingo, CISA, CISM, ITIL-F ISACA Valencia Chapter Research Director Astrea Managing Partner
2 March Table of contents Electronic signature standards status. Conformity assessment. Opportunities for auditors.
3 March Electronic signature standards status 1 Electronic signature is quickly maturing, especially when based in digital certificates (PKI-based e-sign). The European Telecommunication Standards Institute, under the EU Commission Mandate 460, is producing a Rationalised Framework for Electronic Signature Standardisation (SR v1.1.1): Signature Creation and Validation. Signature Creation and Other Related Devices. Cryptographic Suites. Trust Service Providers supporting esignatures. Trust Application Service Providers. Trust Service Status (List) Provider.
4 March Electronic signature standards status 2 Rationalised Framework for Electronic Signature Standardisation (SR v1.1.1). Document types: Guidance: This type of documents does not include any normative requirements but provides business driven guidance on addressing the esignature (functional) area, on the selection of applicable standards and their options for a particular business implementation context and associated business requirements, on the implementation of a standard (or a series of standards), on the assessment of a business implementation against a standard (or a series of standards), etc. Policy & Security Requirements: This type of document specifies policy and security requirements for services and systems, including protection profiles. This brings together use of other technical standards and the security, physical, procedural and personnel requirements for systems implementing those technical standards.
5 March Electronic signature standards status 3 Rationalised Framework for Electronic Signature Standardisation (SR v1.1.1). Document types: Technical Specifications: This type of document specifies technical requirements on systems. This includes but is not restricted to technical architectures (describing standardised elements for a system and their interrelationships), formats, protocols, algorithms, APIs, profiles of specific standards, etc. Conformity Assessment: This type of document addresses requirements for assessing the conformity of a system claiming conformity to a specific set of technical specifications, policy or security requirements (including protection profiles when applicable). This primarily includes conformity assessment rules (e.g. common criteria evaluation of products or assessment of systems and services).
6 March Electronic signature standards status 4 Rationalised Framework for Electronic Signature Standardisation (SR v1.1.1). Document types: Testing Compliance & Interoperability: This type of document addresses requirements and specifications for setting-up interoperability tests or testing systems or for setting-up tests or testing systems that will provide automated checks of compliance of products, services or systems with specific set(s) of technical specifications.
7 March Conformity assessment 1 Signature Creation & Validation: EN Conformity Assessment for Signature Creation and Validation Applications (& Procedures) This document introduces the three aspects of assessment detailed in separate specifications: a) Assessment of user environment against policy requirements: the conformity rules for assessing conformity of SCA or SVA against Policy Requirements. b) Assessment of products and applications for electronic signature creation and validation against protection profiles. c) Assessment of conformity to Advanced Electronic Signature formats and protocols. d) Assessment of conformity of a specific machine processable signature policy to the business process policy requirements.
8 March Conformity assessment 2 Signature Creation and other Related Devices: EN Conformity Assessment of Secure Devices and Trustworthy systems This document provides guidance on conformity assessment of Secure Creation Devices against the specifications EN and guidance on conformity assessment for trustworthy systems against the specifications EN , EN , EN and EN The guidance is intended for use by designated bodies, assessors, evaluators and manufacturers.
9 March Conformity assessment 3 Trust Service Providers supporting Electronic Signatures: EN : General requirements and guidance for Conformity Assessment of TSPs Supporting Electronic Signatures This document specifies general requirements for conformity assessment independent of the form of TSP and provides guidance for the supervision and assessment of a TSP supporting electronic signatures. EN : Conformity Assessment for TSPs Issuing Certificates This document specifies requirements and provides guidance for the supervision and assessment of a TSP issuing certificates. EN Conformity Assessment for TSPs providing Time-Stamping Services This document specifies requirements and provides guidance for the supervision and assessment of a TSP providing time-stamping services.
10 March Conformity assessment 4 Trust Service Providers supporting Electronic Signatures: EN Conformity Assessment for TSPs providing Signature Generation Services This document specifies requirements and provides guidance for the supervision and assessment of a TSP providing Signature Generation Services. EN Conformity Assessment for TSPs providing Signature Validation Services This document specifies requirements and provides guidance for the supervision and assessment of a TSP providing Signature Validation Services.
11 March Conformity assessment 5 Trust Application Service Providers: EN Conformity Assessment of Registered Electronic Mail Service Providers This document specifies requirements and provides guidance for the supervision and assessment of a Registered Electronic Mail Service Provider based on general requirements and guidance for conformity assessment specified in EN EN Conformity Assessment of Data Preservation Service Providers This document specifies requirements and provides guidance for the supervision and assessment of a DPSP based on general requirements and guidance for conformity assessment specified in EN
12 March Opportunities for auditors ISACA body of standards offer a comprehensive body of ethics and practice foundations (e.g. under ITAF). We may provide value when performing the conformity assessment, fostering the adoption of this technologies BUT current audit procedures and standards are a bit old (2002). We should possibly update and align our practices to the rationalised framework. The approach should maintain regulatory neutrality but may leverage the ETSI structure, and apply it on a global basis.
13 MANY THANKS Ignacio ( Nacho ) Alamillo Domingo ISACA Valencia Chapter Research Director Astrea Managing Partner [email protected]
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation
ETSI TR 119 000 V0.0.3 (2014-01)
TR 119 000 V0.0.3 (2014-01) TECHNICAL REPORT Electronic Signatures and Infrastructures (ESI); Rationalised structure for Electronic Signature Standardisation COMPLETE DRAFT FOR PUBLIC REVIEW UNTIL 7 MARCH
NIST-Workshop 10 & 11 April 2013
NIST-Workshop 10 & 11 April 2013 EUROPEAN APPROACH TO OVERSIGHT OF "TRUST SERVICE PROVIDERS" Presented by Arno Fiedler, Member of European Telecommunications Standards Institute Electronic Signatures and
STANDARDISIERUNG FÜR EIDAS IM MANDATE/460
STANDARDISIERUNG FÜR EIDAS IM MANDATE/460 TeleTrusT Signaturtag 17.09.2015 ETSI 2014. All rights reserved STANDARDISIERUNG FÜR EIDAS IM MANDATE/460 TeleTrusT Signaturtag 17.09.2015 ETSI 2014. All rights
ETSI TC ESI PRESENTATION TO CAB FORUM. ETSI 2015. All rights reserved
ETSI TC ESI PRESENTATION TO CAB FORUM Iñigo Barreira March 2015 meeting, Cupertino ETSI 2015. All rights reserved Index ETSI Deliverables. Dates ETSI audits eidas timeline: Qualified web site certificates
DS-05-2015: Trust eservices. The policy context: eidas Regulation
DS-05-2015: Trust eservices The policy context: eidas Regulation Cybersecurity & Privacy Innovation Forum 2015 Brussels, 28 April 2015 Andrea SERVIDA DG CONNECT, European Commission Head of eidas Task
Implementation of eidas through Member States Supervisory Bodies
Implementation of eidas through Member States Supervisory Bodies Riccardo Genghini - ETSI TC ESI & CEN-ETSI e-sign Coord. Group Chairman CA Day Berlin June 09 th, 2015 ETSI 2013. All rights reserved 2
ETSI TS 119 403 V2.1.1 (2014-11)
TS 119 403 V2.1.1 (2014-11) TECHNICAL SPECIFICATION Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing
ETSI EN 319 403 V2.2.2 (2015-08)
EN 319 403 V2.2.2 (2015-08) EUROPEAN STANDARD Electronic Signatures and Infrastructures (ESI); Trust Service Provider Conformity Assessment - Requirements for conformity assessment bodies assessing Trust
Prof. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
esignature building block Introduction to the Connecting Europe Facility DIGIT Directorate-General for Informatics
Introduction to the Connecting Europe Facility esignature building block DIGIT Directorate-General for Informatics DG CONNECT Directorate-General for Communications Networks, Content and Technology February
http://www.arx.com/about/press-room/interviews/nacho-alamillo-digital-signature-expert
1 de 7 16/06/2014 9:48 Contact Us Search Home (http://www.arx.com) About (http://www.arx.com/about/) Media (http://www.arx.com/about/press-room/) Interviews (http://www.arx.com/about/press-room/interviews/)
Terms of Reference for an IT Audit of
National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor
OneCoin Blockchain Audit Report
OneCoin Blockchain Audit Report June 2015 Semper Fortis Ltd А Republic of Bulgaria, Sofia 1000, 54 William Gladstone Str., floor 3 Т +359 2 44 123 79 F +359 2 44 128 79 E [email protected] W www.semperfortis.bg
Information Security Specialist Training on the Basis of ISO/IEC 27002
Information Security Specialist Training on the Basis of ISO/IEC 27002 Natalia Miloslavskaya, Alexander Tolstoy Moscow Engineering Physics Institute (State University), Russia, {milmur, ait}@mephi.edu
Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013
Security framework Guidelines for trust services providers Part 1 Version 1.0 December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Security framework Guidelines
SSLPost Electronic Document Signing
SSLPost Electronic Document Signing Overview What is a Qualifying Advanced Electronic Signature (QAES)? A Qualifying Advanced Electronic Signature, is a specific type of digital electronic signature, that
ONR CEN/TS 419241. Security Requirements for Trustworthy Systems Supporting Server Signing (prcen/ts 419241:2013) DRAFT ICS 35.240.
ICS 35.240.99 DRAFT ONR CEN/TS 419241 Security Requirements for Trustworthy Systems Supporting Server Signing (prcen/ts 419241:2013) Sicherheitsanforderungen für Vertrauenswürdige Systeme, die Serversignaturen
Qualified Time Stamping and eregistered Delivery Services Overall considerations
eias Study on an electronic identification, authentication and signature policy Qualified Time Stamping and eregistered Delivery Services Overall considerations Building blocks for secondary legislation
IS Audit and Assurance Guideline 2402 Follow-up Activities
IS Audit and Assurance Guideline 2402 Activities The specialised nature of information systems (IS) audit and assurance and the skills necessary to perform such engagements require standards that apply
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION
LEGAL FRAMEWORK FOR E-SIGNATURE IN LITHUANIA AND ENVISAGED CHANGES OF THE NEW EU REGULATION Aušra Kumetaitienė Head of Information Society Development Division Tomas Jakimavičius Telecommunications and
UKAS Guidance for bodies operating certification of Trust Service Providers seeking approval under tscheme
CIS 3 EDITION 2 February 2014 UKAS Guidance for bodies operating certification of Trust Service Providers seeking approval under tscheme CONTENTS SECTION PAGE 1 Introduction 2 2 Requirements for Certification
BANK OF RUSSIA RECOMMENDATIONS ON STANDARDISATION MAINTENANCE OF INFORMATION SECURITY OF THE RUSSIAN BANKING SYSTEM ORGANISATIONS
BANK OF RUSSIA RECOMMENDATIONS ON STANDARDISATION RS BR IBBS-2.1-2007 MAINTENANCE OF INFORMATION SECURITY OF THE RUSSIAN BANKING SYSTEM ORGANISATIONS GUIDELINES FOR SELF-ASSESSMENT OF CONFORMITY OF INFORMATION
ETSI TS 102 573 V1.1.1 (2007-07)
TS 102 573 V1.1.1 (2007-07) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for trust service providers signing and/or storing data for digital accounting 2
Electronic Signatures in Norway Supervision and Legal Aspects
Electronic Signatures in Norway Supervision and Legal Aspects By Kristina Rognmo Adviser Section for ecommunication and Internet Networks Department Norwegian Post and Telecommunications Authority 1 Agenda
ETSI EN 319 401 V1.1.1 (2013-01)
EN 319 401 V1.1.1 (2013-01) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 EN 319 401 V1.1.1
TECHNICAL REPORT Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures: overview
TR 119 000 V1.2.1 (2016-04) TECHNICAL REPORT Electronic Signatures and Infrastructures (ESI); The framework for standardization of signatures: overview 2 TR 119 000 V1.2.1 (2016-04) Reference RTR/ESI-0019000v121
Mapping COBIT 5 with IT Governance, Risk and Compliance at Ecopetrol S.A. By Alberto León Lozano, CISA, CGEIT, CIA, CRMA
Volume 3, July 2014 Come join the discussion! Alberto León Lozano will respond to questions in the discussion area of the COBIT 5 Use It Effectively topic beginning 21 July 2014. Mapping COBIT 5 with IT
GSA FIPS 201 Evaluation Program
GSA FIPS 201 Evaluation Program David Temoshok Director, Federal Identity Policy and Management GSA Office of Governmentwide Policy NIST/DHS/TSA TWIC QPL Workshop April 21, 2010 1 HSPD-12 Government-wide
An Electronic Signature Service Infrastructure for the European Commission
An Electronic Signature Service Infrastructure for the European Commission ETSI, 3 December 2013 Philippe Schneider European Commission, DG Informatics I.T. Contents t What is ESSI ESSI offering and orientation
Draft ETSI EN 319 401 V1.1.1 (2012-03)
Draft EN 319 401 V1.1.1 (2012-03) European Standard Electronic Signatures and Infrastructures (ESI); General Policy Requirements for Trust Service Providers supporting Electronic Signatures 2 Draft EN
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
Presented by. Denis Darveau CISM, CISA, CRISC, CISSP
Presented by Denis Darveau CISM, CISA, CRISC, CISSP Las Vegas ISACA Chapter, February 19, 2013 2 COBIT Definition Control Objectives for Information and Related Technology (COBIT) is an IT governance framework
CISA TIMETABLE (4 DAYS)
CISA TIMETABLE (4 DAYS) ISACA-CISA Day 1 9.00 9.30 Welcome, Introductions, Coffee 9.30 11.00 About the CISA Exam Domain 1 - The Process of Auditing Information Systems Auditing Types of Audits Audit Methodology
ISO 27001:2005 & ISO 9001:2008
ISO 27001:2005 & ISO 9001:2008 September 2011 1 Main Topics SFA ISO Certificates ISO 27000 Series used in the organization ISO 27001:2005 - Benefits for the organization ISO 9001:2008 - Benefits for the
ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification
TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:
Automation for Electronic Forms, Documents and Business Records (NA)
Automation for Electronic Forms, Documents and Business Records (NA) White Paper Learn more. www.alphatrust.com Automation for Electronic Forms, Documents and Business Records (NA) White Paper About AlphaTrust
Payment Card Industry (PCI) Additional Security Requirements for Token Service Providers (EMV Payment Tokens)
Payment Card Industry (PCI) Additional Security Requirements for Token Service Providers (EMV Payment Tokens) Frequently Asked Questions December 2015 Introductory Note This document addresses frequently
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30
COBIT 5: A New Governance Framework for Managing & Auditing the Technology Environment CS 6-7: Tuesday, July 7 3:30-4:30 Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP [email protected]
Question: 1 Which of the following should be the FIRST step in developing an information security plan?
1 ISACA - CISM Certified Information Security Manager Exam Set: 1, INFORMATION SECURITY GOVERNANCE Question: 1 Which of the following should be the FIRST step in developing an information security plan?
TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures,
TTP.NL Scheme for management system certification of Trust Service Providers issuing Qualified Certificates for Electronic Signatures, Public Key Certificates, Website Certificates and / or Time-stamp
Protection Profiles for TSP cryptographic modules Part 1: Overview
Date: 2015-08 prts 419221-1:2015 Protection Profiles for TSP cryptographic modules Part 1: Overview Document type: Technical Specification Document language: E Contents Introduction...3 1 Scope...4 2 References...4
INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456. Aristotle University of Thessaloniki PKI (www.pki.auth.gr) WHOM IT MAY CONCERN
Title INDEPENDENT AUDIT REPORT BASED ON THE REQUIREMENTS OF ETSI TS 101 456 Customer Aristotle University of Thessaloniki PKI (www.pki.auth.gr) To WHOM IT MAY CONCERN Date 18 March 2011 Independent Audit
Signature policy for TUPAS Witnessed Signed Document
Signature policy for TUPAS Witnessed Signed Document Policy version 1.0 Document version 1.1 1 Policy ID and location Policy ID Name URL urn:signicat:signaturepolicy:tupas wsd:1.0 Signature policy for
IT Audit in the Cloud
IT Audit in the Cloud Pavlina Ivanova, CISM ISACA-Sofia Chapter Content: o 1. Introduction o 2. Cloud Computing o 3. IT Audit in the Cloud o 4. Residual Risks o Used Resources o Questions 1. ISACA Trust
Submitted to the EC on 03/06/2012. COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex
Submitted to the EC on 03/06/2012 COMPETITIVENESS AND INNOVATION FRAMEWORK PROGRAMME ICT Policy Support Programme (ICT PSP) e-codex e-justice Communication via Online Data Exchange ICT PSP call identifier:
Cloud Computing Security Audit
Cloud Computing Security Audit Teddy Sukardi [email protected] Indonesia IT Consultant Association IKTII Chairman Agenda The data center and the cloud Concerns with cloud implementation The role of cloud
BMC Client Management - SCAP Implementation Statement. Version 12.0
BMC Client Management - SCAP Implementation Statement Version 12.0 BMC Client Management - SCAP Implementation Statement TOC 3 Contents SCAP Implementation Statement... 4 4 BMC Client Management - SCAP
for Information Security
for Information Security The following pages provide a preview of the information contained in COBIT 5 for Information Security. The publication provides guidance to help IT and Security professionals
Digital Signature Verification using Historic Data
Digital Signature Verification using Historic Data Digital signatures are now relatively common; however historic verification of digitally signed data is not so widely understood. As more data is held
RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0
Forum RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying and distribution
AHIA HCCA Auditing & Monitoring Focus Group Defining the Key Roles and Responsibilities Corporate Compliance and Internal Audit.
and Requirement: May be required if the organization must comply with Sarbanes-Oxley. Otherwise, is implemented as an organizational governance/business decision and best practice. Purpose: Provide independent
Recommendation for IT Governance Using the COBIT 4.1 Framework
Recommendation for IT Governance Using the COBIT 4.1 Framework William F. Slater, III, MBA, M.S., PMP, CISSP, CISA Week 7 Assignment CYBR 615 Cybersecurity Governance and Compliance January 27, 2013 January
Cloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority
Cloud Security Standards Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Introduction Sign Off December 2012 Information Technology Authority
Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13
Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...
FOR A PAPERLESS FUTURE. Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic
FOR A PAPERLESS FUTURE Petr DOLEJŠÍ Senior Solution Consultant SEFIRA Czech Republic PAPER IS EVERYWHERE WHY IS THAT? Please no more! Every large organization is typically large paper producer Banks, insurance,
Trusted e-id Infrastructures and services in EU
Trusted e-id Infrastructures and services in EU Recommendations for Trusted Provision of e-government services European Union Agency for Network and Information Security www.enisa.europa.eu About ENISA
Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market
Commission s proposal for a Regulation on Electronic identification and trust services for electronic transactions in the internal market COM(2012)238 of 4.6.2012 ClubPSCo, Paris, 20.6.2012 Gérard GALLER
COMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, 11/XII/2006 C (2006) 6364 final COMMISSION DECISION of 11/XII/2006 List of standards and/or specifications for electronic communications networks,
ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification
TS 102 640-3 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
Key Management Best Practices
White Paper Key Management Best Practices Data encryption is a fundamental component of strategies to address security threats and satisfy regulatory mandates. While encryption is not in itself difficult
A Contrarian Risk Management Perspective. Nicole Keaton SVP Identity & Access Management CGEIT CISA CISM
A Contrarian Risk Management Perspective Nicole Keaton SVP Identity & Access Management CGEIT CISA CISM Introduction Nicole is a Senior Vice President of SunTrust Bank where she has spent six years of
ETSI TR 102 030 V1.1.1 (2002-03)
TR 102 030 V1.1.1 (2002-03) Technical Report Provision of harmonized Trust Service Provider status information 2 TR 102 030 V1.1.1 (2002-03) Reference DTR/SEC-004010 Keywords electronic signature, security,
COBIT Helps Organizations Meet Performance and Compliance Requirements
DISCUSS THIS ARTICLE COBIT Helps Organizations Meet Performance and Compliance Requirements By Sreechith Radhakrishnan, COBIT Certified Assessor, ISO/IEC 20000 LA, ISO/IEC 27001 LA, ISO22301 LA, ITIL Expert,
AlphaTrust PRONTO Enterprise Platform Product Overview
AlphaTrust PRONTO Enterprise Platform Product Overview AlphaTrust PRONTO Enterprise Platform is server-based software that automates the creation of legally enforceable, permanent business records that
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
Quality Assurance Checklist
Internal Audit Foundations Standards 1000, 1010, 1100, 1110, 1111, 1120, 1130, 1300, 1310, 1320, 1321, 1322, 2000, 2040 There is an Internal Audit Charter in place Internal Audit Charter is in place The
ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM
W H I T E P A P E R ELECTRONIC PRESENTATION AND E-SIGNATURE FOR ELECTRONIC FORMS, DOCUMENTS AND BUSINESS RECORDS ALPHATRUST PRONTO ENTERPRISE PLATFORM This white paper is written for senior executives,
Information Security Certifications
HERVÉ SCHAUER CONSULTANTS Cabinet de Consultants en Sécurité Informatique depuis 1989 Spécialisé sur Unix, Windows, TCP/IP et Internet Information Security Certifications Persons / Organizations ENISA
ow to use CobiT to assess the security & reliability of Digital Preservation
ow to use CobiT to assess the security & reliability of Digital Preservation Erpa WORKSHOP Antwerp 14-16 April 2004 Greet Volders Managing Consultant - VOQUALS N.V. Vice President & in charge of Education
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security
Standards in the Digital Single Market: setting priorities and ensuring delivery
Case Id: c2b48264-98a2-4dab-b05c-7e21b2b028b9 Date: 24/12/2015 15:19:42 Standards in the Digital Single Market: setting priorities and ensuring delivery Fields marked with are mandatory. General information
Director, IT Security District Office Kern Community College District JOB DESCRIPTION
Director, IT Security District Office Kern Community College District JOB DESCRIPTION Definition Reporting to the Chief Information Officer, the Director of IT Security develops and implements procedures,
Pharmaceutical, Biotech and Medical Device Manufacturers. Be Compliant and Audit Ready - Implement an LMS!
Pharmaceutical, Biotech and Medical Device Manufacturers Be Compliant and Audit Ready - Implement an LMS! Organizations in the life sciences industry such as pharmaceuticals, medical devices and biotech
Certification and Training
Certification and Training CSE 4471: Information Security Instructor: Adam C. Champion Autumn Semester 2013 Based on slides by a former student (CSE 551) Outline Organizational information security personnel
TrustedX: eidas Platform
TrustedX: eidas Platform Identification, authentication and electronic signature platform for Web environments. Guarantees identity via adaptive authentication and the recognition of either corporate,
NEMA Standards Publication PS 3 Supplement 41. Digital Imaging and Communications in Medicine (DICOM) Digital Signatures
NEMA Standards Publication PS 3 Supplement 1 Digital Imaging and Communications in Medicine (DICOM) Digital Signatures Status: Final Text Sep 001 Prepared by DICOM Standards Committee, Working Group 1
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5
CEF Building blocks. Informatics. Joao Rodrigues Frade DIGIT.B4. CEF Project and Architecture Office Directorate-General for Informatics
CEF Building blocks Joao Rodrigues Frade DIGIT.B4 CEF Project and Architecture Office Directorate-General for AGENDA CEF at a glance CEF reuse logic CEF building blocks A fully functioning Digital Single
EXAMPLES OF FUNCTIONAL COMPETENCIES
EXAMPLES OF FUNCTIONAL COMPETENCIES Functional competencies are specific to a specific department or type of job. Functional competencies describe the knowledge, skill, and/or abilities required to fulfill
Digital Signatures The Law and Best Practices for Compliance. January 2014
Digital Signatures The Law and Best Practices for Compliance January 2014 Electronic/Digital Signature Legislation Disclaimer: ARX is not is not a law firm and does not provide legal advice. We make no
COMMISSION RECOMMENDATION. of 8.9.2011
EUROPEAN COMMISSION Brussels, 8.9.2011 C(2011) 6269 final COMMISSION RECOMMENDATION of 8.9.2011 on support for an EU-wide ecall service in electronic communication networks for the transmission of in-vehicle
