ETIS Information Security in Telecommunications
|
|
- Lenard Thornton
- 8 years ago
- Views:
Transcription
1 ETIS Information Security in Telecommunications ENISA workshop on providers resilience 29 October 2009, Paris Fred Werner, Business Development Manager - ETIS
2 Mission & Vision» What is ETIS? ETIS is a membership based organisation which brings together the major telecommunications providers in Europe on key information and communication technology (ICT) issues.» ETIS Mission The mission of ETIS is to enable its members to improve their business performance by personal exchange of information on using ICT effectively.» ETIS Vision The ETIS vision is to be the acknowledged best platform for sharing knowledge on the use of ICT in Telcos.
3 ETIS Pillars of Activity
4 ETIS Members» ETIS represents 25 Telecom providers supplying voice, mobile and data services all over Europe» Total revenue from ETIS Members was estimate at over 270 Billion euro in 2008
5 ETIS Partners & Associates Associate Members contribute technical competence to our working groups and events and gain feedback on user requirements. ETIS Partners are non-profit international bodies with whom we share knowledge on complementary ICT issues
6 Information Security Working Group» What is the ISWG? In January 2004, the Information Security Working group was established as a follow up to a meeting at the Global Security Conference in Sophia Antipolis in November The working group is currently chaired by Andy De Petter from Belgacom and boasts around 30 members from 20 companies. Meets 3-4 times a year, phone conferences, discussion forums, etc» Role of the group The role of the group is to share knowledge and experiences among members concerning Information Security and related matters and when relevant provide requirements to the industry. To help the members protect their information assets and infrastructure The group is the only Information Security group to concentrate on the telecom market.
7 ISWG Topics Some of the main topics addressed Security Benchmarking Resilience, recovery & business continuity management Anti-SPAM, Anti Phising, Data Retention, Data Privacy Security Culture & Information Security Awareness Campaigns Identity Management & TOP Level Policy Document (TLPD) Value & ROI of Information Security Projects Security Governance models ebusiness Security Revenue Assurance & Financial losses due to security breaches Managed Security services The threat of terrorism from a Telco s perspective Sarbanes-Oxley, compliance and Policy IT Network & client Security Architecture Security in the Supply chain & trends in Security Outsourcing
8 ETIS Security Benchmark 2009 Participating Telcos: TDC, Belgacom, KPN, Telecom Italia, Telekom Austria, Turkcell, TeliaSonera and OTE Objective with the Benchmark: Compare Security strategies and approaches among ETIS member companies, thereby enabling these providers to determine which specific aspect of security require attention within their respective organisations. The following themes are covered in depth: In-depth themes 1. Corporate Security Function 2. Security Management 3. Commercial role of security 4. Fraud Management 5. Security in the development process Exploratory themes 1. Business Continuity Management 2. Next generation security readiness 3. Infrastructure security 4. International cooperation
9 CSF size by security area Corporate Breakdown security of fte CSF per size area by (per security billion EUR area revenue) [FTE per billion EUR revenue] 16,00 14,00 12,00 10,00 8,00 6,00 4,00 Differences in CSF set up reflect the choices each operator has made with respect to incorporating specific security areas. 2,00 0,00 A B C D E F G H Information Security Physical Security Fraud Management Personnel Safety Lawful Interception IT & network security Business Continuity Management Internal Investigations Security of products and services Other
10 Business Continuity Plans & NGN Security Only half of the benchmark participants have a specific BCM policy in place, but all have Business Continuity Plans. Maintaining coherence in these Business Continuity Plans is a difficult task and testing and exercising them only occurs sporadically. Whilst telcos are rapidly embracing Next Generation Network (NGN) infrastructure and services, most of their security units still work with traditional security architectures, baselines and methodologies.
11 ETIS Anti-Spam Co-operation Group The target of the group is to learn and to get feedback on success stories and to develop tangible action plans for reducing outbound SPAM, accepted and shared among best-in-class antispam ISPs reduce the ingress SPAM and so to improve their own QoS by helping others in reducing egress SPAM In this context ETIS Anti-SPAM Co-ordination Group it the glue for trusting each other, for sharing knowledge, for developing a common European ISPs Anti-SPAM strategy Most effective best practice is to block port 25
12 Turk Telekom s success after blocking Port25 17 June 2009 Rank: 1 23 September2009 Rank: 9
13 TI s success after implementing best practices The goal of the TI Anti-spam working group, established in 2008 was to get Turk Telekom and Telecom Italia off the top 10 Autonomous System published on TrendMicro. TOP 10 Spammer TrendMicro TOP 20 Spammer TrendMicro Both the objectives have been reached successfully 13
14 BT s BCM pan EU Network discussion Too costly for any one operator to build separate ductways etc By pooling resources across a number of network operators, and creating additional resilience in the transport and switching Gateways, a smarter, more secure BCM network could be set up, with each country retaining it s own primary routes, therefore not negating any reach advantage of operators. Is anyone else discussing this? Any pilot projects under way?
15 Future plans for the ISWG ETIS Security Benchmark 2010 IMS/VoIP security from a Telco perspective Resilience in European e-communication Networks Partnerships: ENISA, CIIP European Public-Private Partnership for Resilience, Member of EU expert panel on Data Retention Next meetings: - 28/29 January, hosted by Bizanga in Paris - 20/21 May, hosted by KPN in the Hague - 14/15 October, hosted by TeliaSonera in Stockholm
16 To join the Information Security Group or Anti Spam Task Force contact: Fred Werner, ETIS Business Development Manager - Tel
ETIS News Topics - December 2010. e-telit Editorial
- ETIS Community Gathering 2010 Summary >> - ETIS Anti-Spam Best Practices 2010 >> - ETIS Anti-Spam Feedback Loop Project >> - TOGAF Certification Training >> - TeBIT 2010 Benchmarking >> - Gathering 2010
More informationICT budget and staffing trends in the UK
ICT budget and staffing trends in the UK Enterprise ICT investment plans to 2013 January 2013 TABLE OF CONTENTS 1 Trends in ICT budgets... 1 1.1 Introduction... 1 1.2 Survey demographics... 1 1.3 IT budget
More informationInnovative means to exchange telecom fraud and network security risks information
Innovative means to exchange telecom fraud and network security risks information Anastasius Gavras Eurescom GmbH Outline Who is Eurescom? Collaboration as an innovation instrument INNO-UTILITIES Sharing
More informationENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012
ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 christoffer.karsberg@enisa.europa.eu 1 Who we are ENISA was
More information. ABOUT AS http://www.italtel.com/aboutus_home.html
. ABOUT AS http://www.italtel.com/aboutus_home.html COMPANY PROFILE THE MISSION The mission of the Italtel Group is to be a key partner for telecommunication operators (fixed and mobile), Internet Service
More informationICT budget and staffing trends in Healthcare
ICT budget and staffing trends in Healthcare Enterprise ICT investment plans November 2013 ICT budget and staffing trends in Healthcare P a g e 1 www.kable.co.uk / The id Factor Ltd / + 44 (0) 207 936
More informationROADMAP. Proposal on a European Strategy for Internet Security
TITLE OF THE INITIATIVE ROADMAP Proposal on a European Strategy for Internet Security TYPE OF INITIATIVE xcwp Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT INFSO A3 EXPECTED DATE OF ADOPTION
More informationHow To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
More informationCybersecurity for ALL
Cybersecurity for ALL An Overview of ITU s Cybersecurity Activities UNECE International Conference on Technological Readiness for Innovationbased Competitiveness 30 in Geneva, Switzerland Christine Sund
More informationAnti-Spam Measures Survey 2009. Pascal Manzano ENISA
Anti-Spam Measures Survey 2009 Pascal Manzano ENISA Do you remember what happen on June 25 th? Methodology Online questionnaire open from May until July 2009 Questionnaire used providers best practices
More informationNGN Migration Strategies and Access Modernization. 26 May 2011 Dhaka
Overview of ITU Cybersecurity Activities NGN Migration Strategies and Access Modernization 26 May 2011 Dhaka Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific 1 Agenda Why Cybersecurity?
More informationOverview of ITU Cybersecurity Activities
Overview of ITU Cybersecurity Activities Workshop on NGN Regulation & Migration Strategies 13 & 15 October 2010 New Delhi, India Sameer Sharma Senior Advisor ITU Regional Office for Asia and the Pacific
More informationUK Networks & Security An Overview. Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008
UK Networks & Security An Overview Dr Andrew Powell, ENISA Workshops on CERTs in Europe, 29 May 2008 Objectives The structure of your public communication networks The threat landscape these networks face
More informationEU policy on Network and Information Security and Critical Information Infrastructure Protection
EU policy on Network and Information Security and Critical Information Infrastructure Protection Andrea SERVIDA European Commission Directorate General Information Society and Media - DG INFSO Unit A3
More informationThe Partnership between Dolphin & Telecom Italia Sparkle
The Partnership between Dolphin & Telecom Italia Sparkle Rome, 31 October 2014 0 Dolphin and TI Sparkle Partnership in Ghana: the two partners Dolphin group, part of Expresso Telecom group, is a 2nd largest
More informationCritical Information Infrastructure Protection A perspective & Reality from the Commonwealth
Critical Information Infrastructure Protection A perspective & Reality from the Commonwealth Commonwealth Cybersecurity Forum BT Centre, London 22-24 April 2015 Dr Martin Koyabe Head of Research & Consultancy
More informationVOIP CONSUMER RETAIL OFFERS
VOIP CONSUMER RETAIL OFFERS VoIP (Voice over Internet Protocol) experienced a first period of hype during the late 1990s but available bandwidth and speech quality were such that faith in VoIP was quickly
More informationEU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
More informationICANN- INTERNET CORPORATION OF ASSIGNED NAMES & NUMBERS
ICANN- INTERNET CORPORATION OF ASSIGNED NAMES & NUMBERS Prof.Vivekanandan MHRD IP CHAIR PROFESSOR National Academy of Legal Studies Research University (NALSAR) www.nalsarpro.org vivekvc2001@yahoo.co.in
More informationCyber security in an organization-transcending way
Cyber security in an organization-transcending way EASEE-gas meeting March 19, 2015 Paul Bloemen ICT Security Manager Gasunie Chair Dutch Energy ISAC March 19, 2015 2 What to talk about Why is cyber security
More informationProf. Udo Helmbrecht
Prof. Udo Helmbrecht Guiding EU Cybersecurity from Policy to Implementation Udo Helmbrecht Executive Director Information Security for the Public Sector 2015 Stockholm 02/09/15 European Union Agency for
More informationNational Contact Management Strategy
National Contact Management Strategy 2012 NCMS 2012 NOT PROTECTIVELY MARKED 4 National Contact Management Strategy (NCMS) This document has been produced by the Association of Chief Police Officers (ACPO)
More informationWhat legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn
More informationSolution & Service Portfolio for the Telco Market.
Telecommunications IP-Based Communications Solution & Service Portfolio for the Telco Market. IP-Based Communications. Business flexibility!" ==Systems=== Solution & Service Portfolio for the Telco Market.
More informationThe Role of OSGi Technology in the Home Gateway Initiative (HGI) and End to End Connectivity and Service Provisioning
The Role of OSGi Technology in the Home Gateway Initiative (HGI) and End to End Connectivity and Service Provisioning Paolo PASTORINO Chief Technology and Chief Business Officer Home Gateway Initiative
More informationBusiness Continuity Planning
Business Continuity Planning Public Entities Risk Management Forum 5 th July 2012 Presented by Mark Penberthy FBCI Overcoming Practical Challenges Business Continuity Management (BCM) AGENDA 1. What is
More informationS E P T E M B E R 2 0 0 6. Welcome to Our World. The Global VoIP Company NASDAQ: IBAS 12/05
S E P T E M B E R 2 0 0 6 Welcome to Our World The Global VoIP Company NASDAQ: IBAS 12/05 Safe Harbor Statement Except for historical information, all of the expectations, plans and assumptions contained
More informationOsterman Research Executive Summary
Osterman Research Executive Summary Report Focus Any email user, IT manager, CIO or network administrator will attest to the fact that threats introduced into an organization through the email system and,
More informationNIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA
NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA ViS!T - Verwaltung integriert sichere Informationstechnologie, Wien, 29.10.2014 European Union Agency
More informationIntroductory address by Minister Stefania Giannini at the Informal Meeting of the Research Ministers of the European Union. Milano, July 22, 2014
Introductory address by Minister Stefania Giannini at the Informal Meeting of the Research Ministers of the European Union Milano, July 22, 2014 Dear Commissioner, Dear Colleagues, Heads and Members of
More informationDr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA. evangelos.ouzounis@enisa.europa.eu
Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA evangelos.ouzounis@enisa.europa.eu 5 th German Anti-Spam Summit Koeln, 5 th of Sept. 2007 www.enisa.europa.eu 1 Agenda NIS a Challenge for the
More informationCyber security initiatives in European Union and Greece The role of the Regulators
Cyber security initiatives in European Union and Greece The role of the Regulators Constantinos Louropoulos President of Hellemic Telecoms and Post Commission Agenda Cyberspace challenges EU security initiatives
More informationDecisioning for Telecom Customer Intimacy. Experian Telecom Analytics
Decisioning for Telecom Customer Intimacy Experian Telecom Analytics Turning disruption into opportunity The traditional telecom business model is being disrupted by a variety of pressures from heightened
More informationCustomer Experience Strategy and Implementation
Customer Experience Strategy and Implementation Enterprise Customer Experience Transformation 2014 Andrew Reise, LLC. All Rights Reserved. Enterprise Customer Experience Transformation Executive Summary
More informationIP Telephony and ENUM
NGN IP Telephony and ENUM APEC TEL 30 Next Generation Networks James Seng Assistant Director, Enabler Technologies What is Voice over IP? ) ) ) 1010101000010 1001010101010 1001010101010 0101010001001 TCP/IP
More informationContact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:
E-mail security About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for the
More informationFAQ to ENISA s report on technologies to improve the resilience of communication networks
FAQs to reports on technologies to improve the resilience of communication networks FAQ to ENISA s report on technologies to improve the resilience of communication networks This FAQ covers the latest
More informationSecurity Management - A Model For Successful Practices
Benchmark observations 2010-2012 Date October 7th 2012 Authors H. Kerkdijk M.Sc. and R. Wolthuis M.Sc. Version: FINAL ETIS 2012 Successful Practices in Telco Security Produced by Authors Project manager
More informationSmartShore Offerings. Your Gateway to Knowledge Process Outsourcing and Remote Infrastructure Mgmt.
DISCUSSION DOCUMENT SmartShore Offerings Your Gateway to Knowledge Process Outsourcing and Remote Infrastructure Mgmt. SmartShore Services, Inc. sales@smartshore.us Tel 203-653-7235 Sep 9, 2009 Overview
More informationOnline Business / E-Commerce Scrutiny Review Update Report
Economic & City Development Overview & Scrutiny Committee 25 March 2014 Report of the Online Business / E-Commerce Task Group Online Business / E-Commerce Scrutiny Review Update Report Summary 1. This
More informationCOMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'
EUROPEAN COMMISSION Brussels, 2.7.2014 SWD(2014) 214 final COMMISSION STAFF WORKING DOCUMENT Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe' Accompanying
More informationCouncil of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union
Council of the European Union Brussels, 4 July 2014 (OR. en) 11603/14 ADD 1 COVER NOTE From: date of receipt: 2 July 2014 To: No. Cion doc.: Subject: RECH 323 TELECOM 140 MI 521 DATAPROTECT 100 COMPET
More informationPress pack. Paris, 20 June 2012. Investing for the future
Press pack Paris, 20 June 2012 Investing for the future The "INFINI DRIVE" project for the development of electric vehicle recharging infrastructures has been selected by ADEME (French Environment and
More informationBT Unified Trading communication. The Future Delivered
BT Unified Trading communication The Future Delivered BT Unified Trading With BT Unified Trading, BT has set the benchmark for the next decade by bringing to market a powerful, cost-effective, software-based
More informationAction Plan 2010-2015 for Canada s Cyber Security Strategy
Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated
More informationAddress C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
More informationGrid Computing: Telco Perspective
International Telecommunication Union ITU-T Grid Computing: Telco Perspective Rick Schlichting Director, Software Systems Research AT&T Labs Research, USA ITU-T/OGF Workshop on Next Generation Networks
More informationEU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
More informationNetwork security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece
Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU
More informationPowering Up the Network: A Report on Small Business Use of E-business Solutions in Canada
Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada February 2010 Overview Canada is a world leader in many areas: energy, natural resources and the financial services
More informationDigital Entrepreneurship: The EU vision, strategy and actions
The digital economy at the heart of the economic and social transition of EU Regions Digital Entrepreneurship: The EU vision, strategy and actions EITO Task Force Meeting, 14th November 2014 Michael Berz
More informationWhat Are the Measures Used by European Providers to Reduce the Amount of Spam Received by Their Customers?
ENISA 2009 spam survey December 09 Measures used by providers to reduce spam What Are the Measures Used by European Providers to Reduce the Amount of Spam Received by Their Customers? Third ENISA Anti-Spam
More informationCyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationSupporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
More information3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security
Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda
More informationOsterman Research Executive Summary
1 Osterman Research Executive Summary Messaging is the primary communications medium for many enterprises today and the one that its users can afford least to be without. At the heart of this medium is
More informationOUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
More informationThe rise of the hybrid network model
The rise of the hybrid network model Hybrid networks offer the promise of greater flexibility and capacity, improved application performance and cheaper price points than traditional Wide Area Networks
More informationCloud Business Case G-Cloud 5 Framework
Cloud Business Case G-Cloud 5 Framework Cloud Business Case Service Definition Document April 2014 Warnford Court, 29 Throgmorton Street, London, EC2N 2AT T: +44 20 7947 4176 Table of contents 1 Cloud
More informationCustomer analytics case study: T-Mobile Austria
mwd a d v i s o r s Best Practice Insight Customer analytics case study: T-Mobile Austria Helena Schwenk Premium Advisory Report April 2011 This report examines T-Mobile Austria s use of Portrait Customer
More informationCustomer Experience Management
Customer Experience Management 10 tips for the successful development and execution of Chris Bland Research Director SPA Future Thinking Introduction, sometimes referred to as Customer Feedback Programmes,
More informationRevenue Enhancement and Churn Prevention
Revenue Enhancement and Churn Prevention for Telecom Service Providers A Telecom Event Analytics Framework to Enhance Customer Experience and Identify New Revenue Streams www.wipro.com Anindito De Senior
More informationAssuring Telecom (Infrastructure and Services) An Operations Perspective
Industry Canada Assuring Telecom (Infrastructure and Services) An Operations Perspective IC Security Roles and Activities Assure Telecom Infrastructure and Services Enhance Telecom Security Expertise and
More informationEurope s Digital Economy at Risk. Eight trends why the European digital economy is losing ground
Europe s Digital Economy at Risk Eight trends why the European digital economy is losing ground key measures to regain a leading position. WHY EUROPE S DIGITAL ECONOMY IS FALLING BEHIND. Trend 1 Trend
More informationVOIP CONSUMER RETAIL OFFERS
VOIP CONSUMER RETAIL OFFERS INTRODUCTION Voice over Internet Protocol (VoIP) experienced a period of hype during the late 1990s but along with the dot.com crash the faith in VoIP as a service for residential
More informationLith Networking and Network Marketing Safety
DIRECTION TO SUCCESS. PUBLIC AND PRIVATE SECTORS PARTNERSHIP WSIS Action Line Facilitation Meeting: Building confidence and security in the use of ICTs (C5) Partnerships for Global Cybersecurity ITU Geneva,
More informationNationwide Deployment of Social Alarms in Sweden
Nationwide Deployment of Social Alarms in Sweden ehealth forum May 13 th 2014, Athens Greece The EIP AHA Scale-up Strategy Background problems and uncertainties Background the root of the problem The telecommunication
More informationNational Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
More informationWebinar: FTTH Market in Europe Status and Analysis. Moderator: Jan Schindler Chair Market Intelligence Committee FTTH Council Europe
Webinar: FTTH Market in Europe Status and Analysis Moderator: Jan Schindler Chair Market Intelligence Committee FTTH Council Europe FTTH Council Europe A sustainable future for Europe enabled by Fibre
More informationCyber Security for Railway Signalling
Cyber Security for Railway Signalling Dr. Cédric LÉVY-BENCHETON Network and Information Security Expert European Union Agency for Network and Information Security How to protect signalling system against
More informationEuropean Distribution System Operators for Smart Grids
European Distribution System Operators for Smart Grids Network and information security (NIS): Recommendations for information sharing and risk management September 2014 Executive summary Our modern society
More informationSECRETARIAT REPORT 2014 31 TH Annual General Meeting Co-hosted by TELESUR 25 th -29 th January 2015 Paramaribo, Suriname
SECRETARIAT REPORT 2014 31 TH Annual General Meeting Co-hosted by TELESUR 25 th -29 th January 2015 Paramaribo, Suriname By Regenie Fräser Secretary General CANTO CANTO CANTO is recognized as the leading
More informationGetting a 360 customer view with SAP Business Communications Management (BCM)
SAP Digital Services the way we do it o Getting a 360 customer view with SAP Business Communications Management (BCM) Capgemini can help you deploy BCM to achieve multi-channel integration across all your
More informationGlobal Mobility Outsourcing
Vodafone Global Enterprise Global Mobility Outsourcing Whitepaper Vodafone Global Enterprise The bottom line: By 2012, the number of mobile workers is expected to reach one billion worldwide (Source IDC,
More informationImpact of architecture on governance: IPv6 and Internet post-ip
Impact of architecture on governance: IPv6 and Internet post-ip Jean-Michel Cornu, Chief scientist Fing Internet Governance: Transparency Trust and Tools (IG3T) Technical Normalcy and Internet Governance:
More informationCyber Security in EU: ENISA approach
Cyber Security in EU: ENISA approach Konstantinos Moulinos, Security Expert European Union Network and Information Security Agency in Electricity Distribution Grids, Brussels European Union Agency for
More informationTHE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE
THE INFOCROSSING SECURE EMAIL BOUNDARY SERVICE EMAIL BORNE THREATS An Escalating Problem for Every Business More than three out of four emails contain spam, viruses or other malicious content and that
More informationHorizon 2020 Secure Societies
Horizon 2020 Secure Societies Angelo MARINO Head of Unit, Security Research European Commission Research Executive Agency NOT LEGALLY BINDING 2013 Where we come from: FP7-Security R&D (2007-2013): EUR
More informationTelzed Limited Courses and publications
Telzed Limited Courses and publications Information on publications and workshops provided outside of consulting assignments Information to assist with the planning of consulting projects, reports and
More informationUse Logics. The Customer Benefits of Separation. Nick WHITE INTUG
Use Logics The Customer Benefits of Separation Nick WHITE INTUG T he International Telecommunications Users Group (INTUG) was formed in 1974 to ensure that the voice of the user was heard wherever regulatory
More informationWhitepaper - Guide to migrating to SIP
Whitepaper - Guide to migrating to SIP There are both cost savings and productivity benefits to be had by moving from the old circuit switched telephony world to SIP. This short guide describes the steps
More informationICT MASTER PROGRAMME for Information Security / Mobile Services
ICT MASTER PROGRAMME for Information Security / Mobile Services 14.3.2006 Murmansk Development Manager History and Background Founded 1969 as an independent department, joined Faculty of Science in 1987
More informationHybridIT Practice Builder
HybridIT Practice Builder Conceptsales Part of IT Channel Company Private equity funded 150 fte s, 50 mio revenue Business Transformation ICT companies Workshops, Training & Portal Academies & training
More informationNetwork Security Provider Achieves Uninterrupted Voice Services 24x7x365 Worldwide
Network Security Provider Achieves Uninterrupted Voice Services 24x7x365 Worldwide A global leader in the network security appliance solutions has revolutionised the security solutions sector Its innovative
More informationPresentation by: Dr. Nathalie Moreno Partner. Cloud Computing and Data Protection: an Update 4 October 2012
Presentation by: Dr. Nathalie Moreno Partner Cloud Computing and Data Protection: an Update 4 October 2012 Our team Speechly Bircham is an ambitious, international mid-size fullservice law firm head-quartered
More informationEuropean Organization for Security (EOS) - Description and Envisaged Activities for 2012
European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation
More informationOverview of DG INFSO R&D on Trust & Security
Overview of DG INFSO R&D on Trust & Security Mario Scillia European Commission Information Society and Media Directorate General Unit F5 - Trust & Security The views expressed in this presentation are
More informationHarrow Business Consultative Panel. Business Continuity Management. Responsible Officer: Myfanwy Barrett Director of Finance and Business Strategy
Meeting: Harrow Business Consultative Panel Date: 18 th July 2006 Subject: Business Continuity Management Responsible Officer: Myfanwy Barrett Director of Finance and Business Strategy Contact Officer:
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationThe New Telco Data Centre - Pricing for the New Telecoms Data Centre 2014 to 2019
Brochure More information from http://www.researchandmarkets.com/reports/2884649/ The New Telco Data Centre - Pricing for the New Telecoms Data Centre 2014 to 2019 Description: The New Telco Data Centre
More informationHow to change your Internet Service Provider
How to change your Internet Service Provider Introduction At some point or other, you may find yourself needing to change your Internet Service Provider (ISP). The reasons may be many and include cost,
More information2013 European Conferencing Services Customer Value Leadership Award
2013 2013 European Conferencing Services Customer Value Leadership Award 2013 Frost & Sullivan 1 We Accelerate Growth Customer Value Leadership Award Conferencing Services Europe, 2013 Frost & Sullivan
More informationCybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
More informationCOMMISSION OF THE EUROPEAN COMMUNITIES
EN EN EN COMMISSION OF THE EUROPEAN COMMUNITIES Brussels, [ ] COM(2006) 251 COMMUNICATION FROM THE COMMISSION TO THE COUNCIL, THE EUROPEAN PARLIAMENT, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE
More informationInfocomm Security Masterplan 2
INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm
More informationITU SEMINAR (SLOVAKIA) EDI International Settlements Presentation by Eddy Patient
ITU SEMINAR (SLOVAKIA) EDI International Settlements Presentation by Eddy Patient September 2001 EDI & ETIS - Defined Contents Facts about the ETIS/EDI International Settlements Group History of the EDI
More informationWe ve enjoyed being with you through the days of the Plain Old Telephone System.
BT One Voice BT One We ve enjoyed being with you through the days of the Plain Old Telephone System. Over the years we ve supported your phone lines, your private branch exchanges and your calls. Now we
More informationBusiness Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
More informationIPTV LANDSCAPE IN THE USA
IPTV LANDSCAPE IN THE USA STUDY OVERVIEW In this report, we illustrate the different solutions and the different business models of the major programmes currently available for the deployment of IPTV in
More informationInternet Research Task Force Anti-Spam Research Group (ASRG) Presentation Created By: Paul Q. Judge, Chair
Internet Research Task Force Anti-Spam Research Group (ASRG) Presentation Created By: Paul Q. Judge, Chair 1 ASRG status Formed: March 2003 Chairs: Paul Judge and Yakov Shafranovich Membership: 615 members
More information