RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES
|
|
|
- Wesley Wiggins
- 9 years ago
- Views:
Transcription
1 RESPONSIBLE CARE SECURITY CODE OF MANAGEMENT PRACTICES Purpose and Scope The purpose of the Security Code of Management Practices is to help protect people, property, products, processes, information and information systems by enhancing security, including security against potential terrorist attack, throughout the chemical industry value chain. The chemical industry value chain encompasses company activities associated with the design, procurement, manufacturing, marketing, distribution, transportation, customer support, use, recycle and disposal of our products. This Code is designed to help companies achieve continuous improvement in security performance using a risk-based approach to identify, assess and address vulnerabilities, prevent or mitigate incidents, enhance training and response capabilities, and maintain and improve relationships with key stakeholders. The Code must be implemented with the understanding that security is a shared responsibility requiring actions by others such as customers, suppliers, service providers, and government officials and agencies. Everyone in the chemical industry value chain has security responsibilities and must act accordingly to protect the public interest. Implementation of this Security Code is mandatory for all members of the American Chemistry Council to further protect the public, our communities and our employees. Relationship to Guiding Principles Implementation of the Security Code helps achieve several of Responsible Care s Guiding Principles: To operate our facilities in a manner that protects the environment and the health and safety of our employees and the public. To lead in the development of responsible laws, regulations and standards that safeguard the community, workplace and environment. To work with customers, carriers, suppliers, distributors and contractors to foster the safe use, transport and disposal of chemicals. To seek and incorporate public input regarding our products and operations. To make health, safety, the environment and resource conservation critical considerations for all new and existing products and processes. To practice Responsible Care by encouraging and assisting others to adhere to these principles and practices.
2 Relationship to Other Industry Commitments The Security Code complements, and should be implemented in conjunction with, other management practices that demonstrate the industry s commitment to protecting its employees and the public. Existing management practices that enhance community safety and emergency preparedness, pollution prevention, process safety, employee health and safety, product distribution and product stewardship include security components. Companies regularly should reassess these security-related practices in the spirit of continuous performance improvement. Companies also should regularly reassess their participation in, and monitor the activities of, the national TRANSCAER initiative which promotes dialogue and emergency preparedness along chemical transportation routes. Management Practices Each company must implement a risk-based security management system for people, property, products, processes, information and information systems throughout the chemical industry value chain. The chemical industry value chain encompasses company activities associated with the design, procurement, manufacturing, marketing, distribution, transportation, customer support, use, recycle and disposal of our products. The corresponding security management system must include the following thirteen management practices: 1. Leadership Commitment. Senior leadership commitment to continuous improvement through published policies, provision of sufficient and qualified resources and established accountability. The chemical industry s commitment to security starts at the top. This element calls for each company s leadership to demonstrate through their words and actions a clear commitment to security within their company, from corporate headquarters to our facilities. 2. Analysis of Threats, Vulnerabilities and Consequences. Prioritization and periodic analysis of potential security threats, vulnerabilities and consequences using accepted methodologies. Using generally accepted tools and methods, companies will conduct analyses to identify how to further enhance security. This process will be applied at chemical operating facilities using methods developed by Sandia National Laboratories, the Center for Chemical Process Safety, or other equivalent methods. Companies also will be using tools to analyze the security of product sales, distribution and cyber security. These initial analyses will be conducted on an aggressive schedule then conducted periodically thereafter. 2
3 3. Implementation of Security Measures. Development and implementation of security measures commensurate with risks, and taking into account inherently safer approaches to process design, engineering and administrative controls, and prevention and mitigation measures. Companies will take action when they identify and assess potential security risks. Actions can include putting additional or different security measures into place to provide greater protections for people, property, products, processes, information and information systems. At facilities, actions can include measures such as installation of new physical barriers, modified production processes or materials substitution. In product sales and distribution, actions can include measures such as new procedures to protect Internet commerce or additional screening of transportation providers. 4. Information and Cyber-Security. Recognition that protecting information and information systems is a critical component of a sound security management system. Companies will apply the security practices identified in this Code to their cyber assets as well as their physical assets. Information networks and systems are as critical to a company s success as its manufacturing and distribution systems. Special consideration should be given to systems that support e-commerce, business management, telecommunications and process controls. Actions can include additional intrusion detection and access controls for voice and data networks, verification of information security practices applied by digitally-connected business partners, and new controls on access to digital process control systems at our facilities. 5. Documentation. Documentation of security management programs, processes and procedures. To sustain a consistent and reliable security program over time, companies will document the key elements of their program. Consistency and reliability will translate into a more secure workplace and community. 6. Training, Drills and Guidance. Training, drills and guidance for employees, contractors, service providers, value chain partners and others, as appropriate, to enhance awareness and capability. As effective security practices evolve, companies will keep pace by enhancing security awareness and capabilities through training, drills and guidance. This commitment extends beyond employees and contractors to include others, when appropriate, such as product distributors or emergency response agencies. Working together in this fashion improves our ability to deter and detect incidents while strengthening our overall security capability. 3
4 7. Communications, Dialogue and Information Exchange. Communications, dialogue and information exchange on appropriate security issues with stakeholders such as employees, contractors, communities, customers, suppliers, service providers and government officials and agencies balanced with safeguards for sensitive information. Communication is a key element to improving security. Maintaining open and effective lines of communication includes steps such as sharing effective security practices with others throughout industry and maintaining interaction with law enforcement officials. At the same time, companies understand that their role is to protect employees and communities where they operate, while safeguarding information that would pose a threat in the wrong hands. 8. Response to Security Threats. Evaluation, response, reporting and communication of security threats as appropriate. Companies take physical and cyber-security threats very seriously. In the event of such threats, companies promptly will evaluate the situation and respond. Real and credible threats will be reported and communicated to company and law enforcement personnel as appropriate. 9. Response to Security Incidents. Evaluation, response, investigation, reporting, communication and corrective action for security incidents. Companies will be vigilant in efforts to deter and detect any security incident. If an incident should occur, however, the company promptly will respond and involve government agencies as appropriate. After investigating the incident, the company will incorporate key learnings and will, as appropriate, share those learnings with others in industry and government agencies and implement corrective actions. 10. Audits. Audits to assess security programs and processes and implementation of corrective actions. Companies periodically will assess their security programs and processes to affirm those programs and processes are in place and working and will take corrective action as necessary. In appropriate circumstances, assessments also will apply to the programs and processes of other companies with whom the company conducts business such as chemical suppliers, logistics service providers or customers. 4
5 11. Third-Party Verification. Third-party verification that, at chemical operating facilities with potential off-site impacts, companies have implemented the physical site security measures to which they have committed. Chemical industry security starts at our facilities. Companies will analyze their site security, identify any necessary security measures, implement those measures and audit themselves against those measures. To help assure the public that our facilities are secure, the companies will invite credible third parties such as fire fighters, law enforcement officials, insurance auditors and/or federal or state government officials to confirm that the companies have implemented the enhanced physical security measures that they have committed to implement. In addition, companies should consult with these same parties as enhanced physical security measures are being considered and implemented. 12. Management of Change. Evaluation and management of security issues associated with changes involving people, property, products, processes, information or information systems. Our employees and our processes contribute to, and rely upon, changes and innovations in products and technologies. As any changes are considered, our companies will evaluate and address related security issues that may arise. This can include changes such as new personnel assignments to installation of new process equipment or computer software or hardware. 13. Continuous Improvement. Continuous performance improvement processes entailing planning, establishment of goals and objectives, monitoring of progress and performance, analysis of trends and development and implementation of corrective actions. Our industry commitment to security calls for companies to seek continuous improvement in all of our security processes. Since practices for addressing security will evolve, it is anticipated that company security programs and measures will evolve, reflecting new knowledge and technology. Companies continually will be tracking, measuring and improving security efforts to keep people, property, products, processes, information and information systems more secure. ********* Companies will share information on effective security practices within the industry and with external, qualified security professionals. Companies will continue to expand the awareness of and commitment to enhanced security practices throughout the chemical industry value chain. The American Chemistry Council will continue to provide guidance, including examples of effective member security practices, to 5
6 assist members in their implementation of this Code, and will periodically review and as appropriate revise the guidance. Due to the rapidly evolving nature of security issues and related expertise, the American Chemistry Council will reassess the Responsible Care Security Code, its management practices and implementation timetable two years after Code adoption or earlier as appropriate. Security Code implementation guidance will be updated as necessary in the interim. 6
Acknowledgements. Security Code Task Force 04. Sayer H. Al-Shammari TF Leader SABIC. Jassim Darwish Member GPIC. Mansour Al-Dosari Member Qapco
SECURITY CODE Document Number : GPCA-RC-C04 Original Issue: June 15, 2011 Re-issue Date: / / Approval: Dr. Abdul Wahab Al-Sadoun Revision Number: 00 Prepared / Reviewed by: Task Force 01 Ownership: Tahir
Implementation Guide for Responsible Care Security Code of Management Practices Site Security & Verification
Implementation Guide for Responsible Care Security Code of Management Practices Site Security & Verification American Chemistry Council July 2002 This guide necessarily addresses problems of a general
Committed to Environment, Health, & Safety
Committed to Environment, Health, & Safety Environment, Health, and Safety Management System and Policy of W.R. Grace & Co. January 1, 2015 The Grace Environment, Health, and Safety Management System,
Guidance for Addressing Cybersecurity in the Chemical Sector. Version 2.0 December 2004
Guidance for Addressing Cybersecurity in the Chemical Sector December 2004 Legal and Copyright Notice The Chemical Industry Data Exchange (CIDX) is a nonprofit corporation, incorporated in the State of
PRIORITIZING CYBERSECURITY
April 2016 PRIORITIZING CYBERSECURITY Five Investor Questions for Portfolio Company Boards Foreword As the frequency and severity of cyber attacks against global businesses continue to escalate, both companies
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
April 28, 2014. Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC
April 28, 2014 Ms. Hada Flowers Regulatory Secretariat Division General Services Administration 1800 F Street, NW, 2 nd Floor Washington, DC RE: Information Technology Sector Coordinating Council (IT SCC)
ICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy [email protected] www.icba.org ICBA Summary
Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud
Securing Internet Payments across Europe Guidelines for Detecting and Preventing Fraud Table of Contents Executive Summary Protecting Internet Payments: A Top Priority for All Stakeholders European Central
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Health, Security, Safety and Environment (HSE)
Health, Security, Safety and Environment (HSE) Content: 1 Objective 2 Application and Scope 21 Application of HSE Directive with underlying documents 22 Scope of HSE Management system 3 Framework for our
BSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
Acknowledgements. Distribution Code Task Force 02. Albert E. Biggs TF Leader Sipchem. Neil Driscoll Member Borouge. Abdullah Al-Enazi Member Sabic
DISTRIBUTION CODE Document Number : GPCA-RC-C02 Original Issue: June 15, 2011 Re-issue Date: / / Approval: Dr. Abdul Wahab Al-Sadoun Revision Number: 00 Prepared / Reviewed by: Task Force 01 Ownership:
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
Elements Of An Effective Export Compliance Program
Elements Of An Effective Export Compliance Program Renee Osborne Export Management & Compliance Division Office of Exporter Services Bureau of Industry and Security U.S. Department of Commerce Effective
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected]
Backgrounder Office of Public Affairs Telephone: 301/415-8200 E-mail: [email protected] Nuclear Security Background While security of the nuclear facilities and materials the NRC regulates has always been a
Does it state the management commitment and set out the organizational approach to managing information security?
Risk Assessment Check List Information Security Policy 1. Information security policy document Does an Information security policy exist, which is approved by the management, published and communicated
Risk-Based Approach to Managing Supply Chain Security and Compliance
Risk-Based Approach to Managing Supply Chain Security and Compliance Supply chain security remains a U.S. policy priority, and the U.S. Government continues to work closely with the trade community to
Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT PLAN (ISSM)
LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT PLAN (ISSM) Environment, Health and Safety Division Ernest Orlando Lawrence Berkeley National Laboratory University of California Berkeley, CA
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce
Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House
Executive Director for Operations AUDIT OF NRC S CYBER SECURITY INSPECTION PROGRAM FOR NUCLEAR POWER PLANTS (OIG-14-A-15)
UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C. 20555-0001 OFFICE OF THE INSPECTOR GENERAL May 7, 2014 MEMORANDUM TO: Mark A. Satorius Executive Director for Operations FROM: Stephen D. Dingbaum
Business Continuity Planning in IT
Introduction: Business Continuity Planning in IT The more your business relies on its IT systems, the more you need to consider how unexpected disruptions might affect your business. These disruptions
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework
(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement
Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs
1 Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs NEW YORK Byungkwon Lim [email protected] Gary E. Murphy [email protected] Michael J. Decker [email protected]
Why you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary
December 17, 2003 Homeland Security Presidential Directive/Hspd-7
For Immediate Release Office of the Press Secretary December 17, 2003 December 17, 2003 Homeland Security Presidential Directive/Hspd-7 Subject: Critical Infrastructure Identification, Prioritization,
NIST Cybersecurity Framework & A Tale of Two Criticalities
NIST Cybersecurity Framework & A Tale of Two Criticalities Vendor Management & Incident Response Presented by: John H Rogers, CISSP Advisory Services Practice Manager [email protected] Presented
CTAA - SAFETY AND SECURITY OFFICER PROGRAM (CSSO)
CTAA - SAFETY AND SECURITY OFFICER PROGRAM (CSSO) 1 Training Agenda: Morning Session-Day 1: Introduction Leadership and Administration Transit Operations Afternoon Session-Day 1: Maintenance and Technology
Finance and Resources Committee
Finance and Resources Committee 10.00am, Thursday 9 June 2016 Supply of Temporary Security Alarm Systems from 1 July 2016 31 March 2017 Item number Report number Executive/routine Wards All Executive summary
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Shell s Health, Safety and Environment (HSE) management system (see Figure 11-1) provides the framework for managing all aspects of the development.
Section 11.1 APPLICATION FOR APPROVAL OF THE DEVELOPMENT PLAN FOR NIGLINTGAK FIELD PROJECT DESCRIPTION INTRODUCTION 11.1.1 HSE MANAGEMENT SYSTEM Shell s Health, Safety and Environment (HSE) management
Operational Excellence Management System
Operational Excellence Management System Operational Excellence Management System FTO Services is committed to conducting business in a manner that is compatible with the environmental and economic needs
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits and Inspections Evaluation Report The Department's Unclassified Cyber Security Program 2011 DOE/IG-0856 October 2011 Department of
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program. Version 1.0 March 2005
The Cybersecurity Journey How to Begin an Integrated Cybersecurity Program March 2005 Legal and Copyright Notice The Chemical Industry Data Exchange (CIDX) is a nonprofit corporation, incorporated in the
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
Issue 1.0. UoG/ILS/IS 001. Information Security and Assurance Policy. Information Security and Compliance Manager
Document Reference Number Date Title Author Owning Department Version Approval Date Review Date Approving Body UoG/ILS/IS 001 January 2016 Information Security and Assurance Policy Information Security
Version Date Comments / Changes 1.0 February 2008 Initial Policy Released 2.0 September 2013 Policy Revised
Page 1 of 5 APPROVED (S) REVISED / REVIEWED SUMMARY Version Date Comments / Changes 1.0 Initial Policy Released 2.0 Policy Revised POLICY As part of an overall strategy to continuously improve workplace
ENVIRONMENTAL, HEALTH & SAFETY MANAGEMENT SYSTEMS MANUAL
September 7, 202 940. General Requirements (ISO 400 4.; OHSAS 800 4.).. Alcoa Fastening Systems Republic Operations (AFS Republic) has established, documented, implemented, maintains, and continuously
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report
U.S. Department of Energy Office of Inspector General Office of Audits & Inspections Evaluation Report The Department's Unclassified Cyber Security Program - 2012 DOE/IG-0877 November 2012 MEMORANDUM FOR
CSX Public Safety, Health, and Environmental Management System
CSX Public Safety, Health, and Environmental Management System As one of the nation s leading suppliers of rail and intermodal transportation, CSX Transportation (CSX) is committed to minimizing the impact
Management of Health, Safety and the Environment
Responsible Officer: Grace Crickette Responsible Office: RK - Risk / EH&S Issuance Date: October 28, 2005 Effective Date: October 28, 2005 Scope: All Faculty, Staff, Administrators, and Students Contact:
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
NASCIO 2014 State IT Recognition Awards
NASCIO 2014 State IT Recognition Awards Project: California Cybersecurity Task Force Category: Cybersecurity Initiatives Project Initiation Date: September, 2012 Project Completion Date: May 2013 Carlos
Health, Safety and Environment Policy
Health, Safety and Environment Policy Novartis Global Policy March 1, 2014 Version HSE 001.V1.EN 1. Introduction At Novartis, our goal is to be a leader in Health, Safety and Environment (HSE). We strive
Ten Steps for Preventing a terrorist Attack
WAR IN IRAQ AND ONGOING THREAT OF TERRORISM COMPEL NEW URGENCY TO MISSION OF SECURITY AND PROTECTION C-level Executives, Companies Should Take Specific Actions to Protect Employees and Help Ensure Business
Network Security: Policies and Guidelines for Effective Network Management
Network Security: Policies and Guidelines for Effective Network Management Department of Electrical and Computer Engineering, Federal University of Technology, Minna, Nigeria. [email protected], [email protected]
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS
TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).
MASSACHUSETTS GAMING COMMISSION: CHIEF INFORMATION OFFICER JOB DESCRIPTION
MASSACHUSETTS GAMING COMMISSION: CHIEF INFORMATION OFFICER JOB DESCRIPTION The Massachusetts Gaming Commission invites applications for the position of Chief Information Officer. The Commission is a new
Committees Date: Subject: Public Report of: For Information Summary
Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security
Operations Integrity Management System
Operations Integrity Management System OPERATIONS INTEGRITY MANAGEMENT SYSTEM: chairman s message 3 ExxonMobil remains steadfast in its commitment to excellence in Safety, Security, Health and Environmental
DHS, National Cyber Security Division Overview
DHS, National Cyber Security Division Overview Hun Kim, Deputy Director Strategic Initiatives Information Analysis and Infrastructure Protection Directorate www.us-cert.gov The strategy of DHS, as defined
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation
GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708
Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order
Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014
Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework September 23, 2014 Executive Order: Improving Critical Infrastructure Cybersecurity It is the policy of the United States to
MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries
IOSCO/MR/54/2015 Madrid, 22 December 2015 IOSCO reports on business continuity plans for trading venues and intermediaries The Board of the (IOSCO) today published two reports that seek to enhance the
Cybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
BUSINESS CONTINUITY POLICY
BUSINESS CONTINUITY POLICY Last Review Date Approving Body n/a Audit Committee Date of Approval 9 th January 2014 Date of Implementation 1 st February 2014 Next Review Date February 2017 Review Responsibility
DOE O 226.1A, IMPLEMENTATION OF DEPARTMENT OF ENERGY OVERSIGHT POLICY CONTRACTOR ASSURANCE SYSTEMS CRITERIA ATTACHMENT 1, APPENDIX A
DOE O 226.1A, IMPLEMENTATION OF DEPARTMENT OF ENERGY OVERSIGHT POLICY CONTRACTOR ASSURANCE SYSTEMS CRITERIA ATTACHMENT 1, APPENDIX A DEFINITIONS Assurance systems encompass all aspects of the processes
How To Write A Cybersecurity Framework
NIST Cybersecurity Framework Overview Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2nd ENISA International Conference on Cyber Crisis Cooperation and Exercises Executive Order
RESPONSIBLE CARE GLOBAL CHARTER. A Special Supplement Presented with
RESPONSIBLE CARE GLOBAL CHARTER A Special Supplement Presented with GLOBAL CHARTER INTRODUCTION 4 ELEMENTS OF THE GLOBAL CHARTER 5 CORE PRINCIPLES 6 FUNDAMENTAL FEATURES 6 SUSTAINABLE DEVELOPMENT 8 CONTINUOUS
Partnership for Cyber Resilience
Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage
Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security
Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security David Brezinski, Professional Services, Enterprise Security Architect Agenda Overview
[STAFF WORKING DRAFT]
S:\LEGCNSL\LEXA\DOR\OI\PARTIAL\CyberWD..xml [STAFF WORKING DRAFT] JULY, 0 SECTION. TABLE OF CONTENTS. The table of contents of this Act is as follows: Sec.. Table of contents. Sec.. Definitions. TITLE
Business Continuity & Disaster Recovery
Business Continuity & Disaster Recovery Safety First Quality Every Time 1 Business Continuity & Disaster Recovery Planning Who here has a formal Business Continuity & Disaster Recovery plan? The purpose
Preventing and Defending Against Cyber Attacks November 2010
Preventing and Defending Against Cyber Attacks November 2010 The Nation s first ever Quadrennial Homeland Security Review (QHSR), delivered to Congress in February 2010, identified safeguarding and securing
Army Regulation 702 11. Product Assurance. Army Quality Program. Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED
Army Regulation 702 11 Product Assurance Army Quality Program Headquarters Department of the Army Washington, DC 25 February 2014 UNCLASSIFIED SUMMARY of CHANGE AR 702 11 Army Quality Program This major
NIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
OECD PROJECT ON CYBER RISK INSURANCE
OECD PROJECT ON CYBER RISK INSURANCE Introduction 1. Cyber risks pose a real threat to society and the economy, the recognition of which has been given increasingly wide media coverage in recent years.
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
KUDELSKI SECURITY DEFENSE. www.kudelskisecurity.com
KUDELSKI SECURITY DEFENSE Cyber Defense Center connection for remote information exchange with local monitoring consoles Satellite link Secure Data Sharing, a data-centric solution protecting documents
Supply Chain Sustainability Code of Conduct
Supply Chain Sustainability Code of Conduct Swire Pacific Offshore (SPO) group has worked worldwide for over 40 years and is strongly committed to operating ethically, prudently, responsibly and safely.
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
Elements of Occupational Safety. Introduction. Policy Development
Introduction If you are a factory owner or manager, you cannot simply look at safety and health problems on an ad hoc basis and hope that the conditions in your workplace comply with national and international
White Paper on Financial Institution Vendor Management
White Paper on Financial Institution Vendor Management Virtually every organization in the modern economy relies to some extent on third-party vendors that facilitate business operations in a wide variety
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM
PROTECTING CRITICAL CONTROL AND SCADA SYSTEMS WITH A CYBER SECURITY MANAGEMENT SYSTEM Don Dickinson Phoenix Contact USA P.O. Box 4100 Harrisburg, PA 17111 ABSTRACT Presidential Executive Order 13636 Improving
Aviation perspectives
www.pwc.com/us/airlines Aviation perspectives 2016 special report series: Cybersecurity and the airline industry Part 1 of 4: Introduction Cybersecurity has become an elevated risk that is among the most
RE: Experience with the Framework for Improving Critical Infrastructure Cybersecurity
October 10, 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 RE: Experience with the Framework for Improving Critical Infrastructure
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
The Role of Internal Audit in Risk Governance
The Role of Internal Audit in Risk Governance How Organizations Are Positioning the Internal Audit Function to Support Their Approach to Risk Management Executive summary Risk is inherent in running any
