Kuwait Government Initiative for ICT Disaster Response
|
|
|
- Allison Grant
- 9 years ago
- Views:
Transcription
1 Kuwait Government Initiative for ICT Disaster Response Laialy Abdullah AlMansoury M.C.s in Computer Security, CISA, PMP, ISO27001:2013 Lead Implementer Head of IS Audit Bureau Central Agency For Information Technology
2 The Initiative Under the initiative of Kuwait Government towards ICT business continuity and disaster recovery response in Kuwait, The Council of Ministers has issued a decree obligating all government agencies to do the following: Prepare Disaster Response Plans. Host their critical systems in a fully-equipped Data Center. And has mandated the Central Agency for Information Technology (CAIT) to supervisor its implementation.
3 TELECOMMUNICATIONS/ICT TO SUPPORT THE DISASTER RESPONSE The Central Agency for Information Technology CAIT has commenced the following: Organized a National Data Center to host critical government systems. Communicated with all government agencies to develop an emergency response plan. Allowed government agencies to utilize Kuwait Information Network- KIN for disaster response. Adopted a network connectivity between KIN and the GCC countries.
4 THE NATIONAL DATA CENTER To fulfil this requirement, CAIT has set up a National Data Center to service the Government at all levels. Government agencies are able to allocate backup systems and replicate critical data. The infrastructure facilitates high availability, quick scalability, efficient operation and management, and optimized utilization of resources. Reliable, organized and practical response in the case of any disaster and in the recovery of crucial data.
5 GOVERNMENT EMERGENCY RESPONSE PLANS Government agencies requested to be prepared for critical incidents by developing a Business Continuity Plan, and reviewing, training, and testing it frequently. CAIT has developed policies and guidelines which every agency must comply with in order to host their systems in the National Data Center, and to organize the responsibilities between CAIT and the agencies.
6 RESPONSIBILITIES CAIT: Environment setup and design that meets the pre-requisites of government agencies. The provision of office space for use by staff in the event of maintenance or an emergency. The connection of systems located in the National Data Center to the government agencies data center. The provision of physical and network security. The Maintenance of the data centers equipment and services. Government Agencies: Install, operate and maintain their systems. Perform all jobs relating to technical support of equipment. Provide the proper level of systems security.
7 UTILIZE KUWAIT INFORMATION NETWORK FOR DISASTER RESPONSE Location 1 Location 2 Network operation center Network equipment Security equipment Location X Location 3 KIN represents the official government network running on top of a secure DWDM/MPLS technology (Layer 2 and Layer 3 virtual private networks [VPNs]) that is capable of connecting the private networks and datacenters of the different agencies, as well as to the wide area connectivity such as the Internet. KIN is capable to deliver high speed connectivity, government and enterprises can deploy their applications throughout the rapid pace. Moreover to the centralized enforcement of confidentiality and protection of government transactions, data and information that is also seen as a strategic objective of KIN project.
8 UTILIZE KUWAIT INFORMATION NETWORK FOR DISASTER RESPONSE KIN provides high availability and an Optical DWDM infrastructure forms the data super highway between 4 different locations represented by MOC exchanges. This Optical/DWDM seamlessly expands on the existing Infrastructure of KIN to cover more new 20 MOC exchanges. KIN is promoting more than 55 government agencies with the ability to deliver (data, sound, images and video) without interruption, dedicating two fiber optic links, each of 1 GBit for the government agencies Data Centers. With such capabilities, KIN has formed an impetus to smoother collaboration among participating agencies and an opportunity for the government to show leadership in the use of innovative technology, to support better service delivery and greater efficiency.
9 KIN MANAGEABILITY- NOC CAIT implemented a state of the art Network Operations Center (NOC) that delivers all monitoring and management services. NOC is a 24/7 operations facility that monitors all KIN devices, and sends the necessary alerts to management console (local or remote) as they happen. NOC runs proactive monitoring and expectation systems. The systems are able to discover the devices malfunctions even before they turn into downtime or before they start to affect KIN efficiency or performance. In addition, NOC systems are also able to analyse, define the real cause of problems, and build historical reporting and an advanced knowledge base.
10 ADOPTING A NETWORK CONNECTIVITY BETWEEN THE GCC COUNTRIES Based on the initiation of Kingdom of Saudi Arabia, CAIT connects KIN to the national networks of Gulf Cooperation Countries (GCC). Connect with GCC governmental networks established through a private and secure network that runs on top of DWDM/MPLS technology using VPN tunnels. Government agencies are now capable to utilize the GCC network for disaster preparedness and response.
11 GOVERNMENT CHALLENGES To optimize the ICT disaster response, Kuwait Government should consider the following: Develop a comprehensive governmental disaster response plan involving all the agencies to cooperate in a seamless and integrated way during the event of a crisis. Roll out business continuity awareness programs. Utilize local and regional networks in the management of disasters. Finance the government agencies for the various resources required for the disaster response requirements, recovery and continued operation.
12 Thank You
Regulatory Framework for Disaster Recovery Planning for the ICT Industry
Regulatory Framework for Disaster Recovery Planning for the ICT Industry Kingdom of Saudi Arabia Regulatory Framework for Disaster Recovery Planning for the ICT Industry Page 1 of 6 1. INTRODUCTION 1.1
Citrix XenServer Backups with SEP sesam
Citrix XenServer Backups with SEP sesam Contents Introduction and Overview...2 XenServer Backup Methods...2 Offline Backup... 3 Online Live Memory Backup... 3 Online Quiesced Backup... 4 Online Normal
Keyfort Cloud Services (KCS)
Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency
INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION
INNOVATE THROUGH MOTIVATION MSP Services Overview SVEN RADEMACHER Agenda About us IT Challenges Our Approach Our Services Next Steps About Us SEAFAIR IT SOLUTIONS Pre-eminent Managed Service Provider Provide
Information Security Policies and Procedures Development Framework for Government Agencies. First Edition - 1432 AH
Information Security Policies and Procedures Development Framework for Government Agencies First Edition - 1432 AH 6 Contents Chapter 1 Information Security Policies and Procedures Development Framework
Information Management Responsibilities and Accountability GUIDANCE September 2013 Version 1
Information Management Responsibilities and Accountability GUIDANCE September 2013 Version 1 Document Control Document history Date Version No. Description Author September 2013 1.0 Final Department of
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS
IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS IT INFRASTRUCTURE MANAGEMENT SERVICES Nortech Remote management IT security Services provide around clock remote Management, real time
Operationalize Policies. Take Action. Establish Policies. Opportunity to use same tools and practices from desktop management in server environment
Microsoft IT Systems Strategy DATACENTER APPLICATIONS Process-Led, Model-Driven Unified and Virtualized USER-CENTRICITY ServiceEnabled Basic Standardize d Rationalized Dynamic Cost center Efficient cost
Nuance OnDemand provides security and reliablity.
provides security and reliablity. Achieving the highest level of security within IVR, Web and mobile customer service applications while meeting the challenges of security certification, compliance and
EUROVISION NETWORK TECHNOLOGIES, FUTURE
EUROVISION NETWORK TRANSMISSION TECHNOLOGIES, PRESENT AND FUTURE 1 CONTENT 01 EUROVISION NETWORK SHORT PRESENTATION 02 EUROVISION NETWORK FUTURE DEVELOPMENTS 2 EUROVISION NETWORK SHORT PRESENTATION 3 THE
EARTHLINK BUSINESS. Simplify the Complex
EARTHLINK BUSINESS IT Simplify the Complex IS YOUR IT VENDOR A TRUSTED BUSINESS PARTNER? With all of the hype surrounding virtualization, cloud computing, and managed services, how do you assess the best
Updating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008
MOC6416 Updating Your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 About this Course This five-day instructor-led course provides students with the knowledge and
Request for Proposal to
Request for Proposal to ( 2016 /ح ك/ 3 ) No. Tender General Response for All Raised Questions Taking into consideration the requirements outlined in the RFP and this Q&A document, bidders need to respond
Exhibit to Data Center Services Service Component Provider Master Services Agreement
Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information
Opengear Technical Note
- Solutions for Avaya Installations Opengear Technical Note Jared Mallett - Product Marketing Manager Opengear solutions deliver cost-effective universal access to Avaya equipment and converged devices
Practice law, not IT. You can save costs while outsourcing to the US law firm technology experts!
Practice law, not IT. You can save costs while outsourcing to the US law firm technology experts! Project Leadership Associates, Inc. (PLA), the largest provider of business and technology consulting services,
Information Services. Standing Service Level Agreement (SLA) Firewall and VPN Services
Information Services Standing Service Level Agreement (SLA) Firewall and VPN Services Overview This service level agreement (SLA) is between Information Services (IS), and any unit at the University of
Remote Monitoring Management (RMM)
MCLOUD PLAYBOOK YOUR GUIDE TO SOURCING CLOUD & IT SERVICES Remote Monitoring Management (RMM) WHERE RAINMAKERS THRIVE IM For more information and pricing, contact Cloud Management Services. In the U.S.and
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
Post-Class Quiz: Business Continuity & Disaster Recovery Planning Domain
1. What is the most common planned performance duration for a continuity of operations plan (COOP)? A. 30 days B. 60 days C. 90 days D. It depends on the severity of a disaster. 2. What is the business
NEC Managed Security Services
NEC Managed Security Services www.necam.com/managedsecurity How do you know your company is protected? Are you keeping up with emerging threats? Are security incident investigations holding you back? Is
OVERVIEW. GDC is - Your Best Connection
OVERVIEW General DataComm (GDC) has over 35 years of field-proven experience in the successful deployment and maintenance of voice and data networking equipment. GDC is highly skilled in all aspects of
Incident Management & Communications. Top 8 Focus Areas to Mitigate Risk
Incident Management & Communications Top 8 Focus Areas to Mitigate Risk Incident Management & Communications Top 8 Focus Areas to Mitigate Risk Delays and errors in operational communications happen every
Ashley Clarke Hosted Desktop. Business Name
Ashley Clarke Hosted Desktop Business Name Our Partner s Technology Partner Ashley Clarke s Hosted Desktop is a full featured Windows 8 style experience delivered from the cloud. One of the key advantages
Appendix 2 - Leicester City Council s Business Continuity Management Policy Statement and Strategy 2015. Business Continuity Policy Statement 2015
Appendix 2 - Leicester City Council s Business Continuity Management Policy Statement and Strategy 2015 Business Continuity Policy Statement 2015 This Policy sets the direction for Business Continuity
New Clerk Academy. August 13, 2015
New Clerk Academy August 13, 2015 Disaster Recovery OVERVIEW Presentation Agenda Introduction and Definitions DR Motivators and Drivers Recovery Challenges Scope of Disasters Components of Recovery Plans
Optimizing the Data Center for Today s State & Local Government
WHITE PAPER: OPTIMIZING THE DATA CENTER FOR TODAY S STATE...... &.. LOCAL...... GOVERNMENT.......................... Optimizing the Data Center for Today s State & Local Government Who should read this
10 Hidden IT Risks That Might Threaten Your Law Firm
(Plus 1 Fast Way to Find Them) Your law firm depends on intelligence. But can you count on your technology? You may not be in the intelligence technology business, but it s probably impossible to imagine
HIGH AVAILABILITY DISASTER RECOVERY SOLUTION
Manvi Sharma CFS-SA-Bladelogic HIGH AVAILABILITY High availability is a system design approach and associated service implementation that ensures a prearranged level of operational performance will be
Perceptive Software Platform Services
Perceptive Software Platform Services CLOUD SOLUTIONS process and content management Perceptive Software Platform Services Perceptive Software process and content management systems have been deployed
White Paper: ISO 22301 Business Continuity Management An Overview. ISO 22301 Business Continuity Management An Overview
White Paper: ISO 22301 Business Continuity Management An Overview ISO 22301 Business Continuity Management An Overview Introduction As incidents such as malicious activism, terrorist attacks and environmental
Managed IT Services. Eliminating technology pains for small businesses
Eliminating technology pains for small businesses Having a complete IT department is not a viable solution for most small businesses, and very few small companies can afford to deploy even one permanent
G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service
G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service 1 of 19 CONTACT INFORMATION Guy Silver T: 07733 008799 E: [email protected] W: www.dcggroup.com Data Continuity Group Limited, Bridge
Job Description. Job Title: Network Services Manager. Department: INFORMATION TECHNOLOGY MAIN PURPOSE OF JOB: MAIN DUTIES AND RESPONSIBILITIES:
Job Description Job Title: Network Services Manager Department: INFORMATION TECHNOLOGY Responsible to: ICT/IS Manager Number of people directly managed: No direct permanent HHL reports: - Supervision of
Cloud Vendor Evaluation
Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business
BOLDCHAT ARCHITECTURE & APPLICATION CONTROL
ARCHITECTURE & APPLICATION CONTROL A technical overview of BoldChat s security. INTRODUCTION LogMeIn offers consistently reliable service to its BoldChat customers and is vigilant in efforts to provide
Agio Remote Monitoring and Management
Remote Monitoring and Management s Remote Monitoring & Management is a 24x7x365 service in which we proactively manage your infrastructure and IT environment to make sure it s in a healthy state and stays
Managed information and communications technology solutions
ICT Solutions Managed information and communications technology solutions managed ict 2 Simplifying our worlds BankservAfrica is the trusted partner to the South African financial services industry, with
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
DATA CENTER SERVICE CATALOG
DATA CENTER SERVICE CATALOG KING SAUD UNIVERSITY DEANSHIP OF ETRANSACTIONS & COMMUNICATION VERSION 1.1 INTERNAL USE ONLY PREPARED BY REVIEWED BY APPROVED BY NAFEZ ALBESHEETI DR.MISHARI ALMISHARI DR.MISHARI
Central Technology. Seamless IT & Communication Solutions
Central Technology Seamless IT & Communication Solutions Our client base is built on reputation for service and quick response times WELCOME Our Business Services It support Cloud Solutions Unified Communications
Online Business Continuity Solutions for Small Businesses Comparison Report: A Sampling of Online Business Continuity, Disaster Recovery, and Backup
Online Business Continuity Solutions for Small Businesses Comparison Report: A Sampling of Online Business Continuity, Disaster Recovery, and Backup Solutions Designed for the Small Business Community
Four Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
Top Ten Technology Risks Facing Colleges and Universities
Top Ten Technology Risks Facing Colleges and Universities Chris Watson, MBA, CISA, CRISC Manager, Internal Audit and Risk Advisory Services [email protected] April 23, 2012 Overview Technology
Backup and Redundancy
Backup and Redundancy White Paper NEC s UC for Business Backup and Redundancy allow businesses to operate with confidence, providing security for themselves and their customers. When a server goes down
ipatch System Manager - HIPAA Compliance
SYSTIMAX Solutions ipatch System Manager - HIPAA Compliance White Paper July 2008 www.commscope.com Overview Health plans, healthcare clearinghouses, healthcare providers including Medicare/ Medicaid agencies
Linexcom Sdn Bhd. ict Group of Companies ver1.2
Linexcom Sdn Bhd No. 9B, 1 st Floor, Jalan PJS 1/27, 46150 Petaling Jaya, Selangor, MALAYSIA General : +603.7781 6020 Fax : +603.7781 6022 Web Page : http://www.linexcom.com Email : [email protected] ict
Involve Cloud Video Conferencing Service. VC:me (Video Conferencing: made easy) Service Definition
Involve Cloud Video Conferencing Service VC:me (Video Conferencing: made easy) Service Definition Contents 1. Service Overview... 3 Reservations Service... 4 Endpoint Management... 4 Reporting... 4 Testing...
Disaster Recovery Checklist Disaster Recovery Plan for <System One>
Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner
The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -
45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART
IT Service Continuity Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
REMOTESTOR CLOUD BASED DATA REPLICATION
REMOTESTOR CLOUD BASED DATA REPLICATION Service Overview Over-the-Wire Disk Based Backup and Replication Primary data backup across the WAN to centralized storage cloud 24/7 backup administration and management
Stellar Phoenix Exchange Server Backup
Stellar Phoenix Exchange Server Backup Version 1.0 Installation Guide Introduction This is the first release of Stellar Phoenix Exchange Server Backup tool documentation. The contents will be updated periodically
Unequalled Physical Security Information Management Software
Unequalled Physical Security Information Management Software Are you in control? Organizational threats and risks are growing and changing all the time. Your business reality means managing these increasing
The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities
Briefing Paper The Virtual Digital Forensics Lab: Expanding Law Enforcement Capabilities Sean A. Ensz University of Oklahoma 200 Felgar Street, Norman, Oklahoma 73019 405.325.3954 Office 405.325.1633 Fax
7Seven Things You Need to Know About Long-Term Document Storage and Compliance
7Seven Things You Need to Know About Long-Term Document Storage and Compliance Who Is Westbrook? Westbrook Technologies, based in Branford on the Connecticut coastline, is an innovative software company
55004A: Installing and Configuring System Center 2012 Operations Manager
Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 55004A: Installing and Configuring System Center 2012 Operations Manager
Total Message Care. Why E-mail Sorting Solutions?
Total Message Care Hosted Email- POP3, IMAP, MAPI, & Web Mail IM Filtering Email Filtering Web Filtering Archiving Shared Calendar, Tasks Mobile Device Synchronization Outlook Compatibility Why E-mail
Citrix XenServer Backups with Xen & Now by SEP WWW.SEPUSA.COM
Citrix XenServer Backups with Xen & Now by SEP WWW.SEPUSA.COM Contents INTRODUCTION AND OVERVIEW... 3 XEN SERVER BACKUP METHODS... 3 OFFLINE BACKUP... 4 ONLINE LIVE MEMORY BACKUP... 4 ONLINE QUIESCED BACKUP...
NVIRON SUPPORT SERVICES OVERVIEW
NVIRON SUPPORT SERVICES OVERVIEW NVIRON SUPPORT SERVICES OVERVIEW SERVICES TO MEET EVERY REQUIREMENT Nviron support services are designed to minimise the cost of running your IT infrastructure and help
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
PAAS Public Sector Managed Services
Meritec Limited Meritec House, Acorn Business Park, Skipton, North Yorkshire, BD23 2UE 0845 3451155 [email protected] www.meritec.co.uk Registered In England & Wales No. 3224622 Table of Contents
Citrix XenDesktop Backups with Xen & Now by SEP
Citrix XenDesktop Backups with Xen & Now by SEP WWW.SEPUSA.COM Table of Contents INTRODUCTIONANDOVERVIEW...3 CITRIXXENDESKTOPENVIRONMENT...4 CITRIXDESKTOPDELIVERYCONTROLLERBACKUP...5 CITRIXLICENSESERVERBACKUP...5
CHIS, Inc. Privacy General Guidelines
CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified
SysAid Cloud Architecture Including Security and Disaster Recovery Plan
SysAid Cloud Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid Cloud: Datacenters Network, Hardware, and Software Components Disaster Recovery Plan
ScaleMatrix safeguards 100 terabytes of data and continuity of cloud services with CA Technologies
CUSTOMER SUCCESS STORY ScaleMatrix safeguards 100 terabytes of data and continuity of cloud services with CA Technologies CLIENT PROFILE Industry: IT services Company: ScaleMatrix Employees: 60 BUSINESS
Optical network diagnostics capabilities for meeting high level Services
Optical network diagnostics capabilities for meeting high level Services S ervice Line Agreements (SLA) are one of the key operating necessities for telecom service providers. Using different levels of
System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012
System Description of the Date Center System Relevant to Security and Availability (SOC 3) November 1, 2011 through April 30, 2012 Moss Adams LLP 9665 Granite Ridge Drive, Suite 600 San Diego, CA 92123
Client Study Portfolio
Client Study Portfolio Client Study 1: UK District Council A re-architecture of the client s RAC Environment and full 24/7 support of the client s database systems thereafter has eliminated the risk of
At a Glance. Key Benefits. Data sheet. A la carte User Module. Administration. Integrations. Enterprise SaaS
HP Application Lifecycle Management on Software-as-a-Service Dedicated HP ALM/QC Offering Data sheet At a Glance The Dedicated HP ALM/QC offering is an on-demand Software-as-a-Service (SaaS) solution for
