Phil Holmes/ Robert Tate. Security Training

Size: px
Start display at page:

Download "Phil Holmes/ Robert Tate. Security Training"

Transcription

1 1 Update Phil Holmes/ Robert Tate

2 Update - Agenda 2 Position in June 1997 Alliance Security Briefings at Member Meetings Relation to BS 7799 Training Matrices Coverage, orientation and approach Actions

3 London Meeting, June 1997 (1) 3 Need for The Open Group to be involved in Security Training Gave some of the options Offer own courses Leverage existing training activity in the market Resource and market issues What The Open Group has to offer

4 London Meeting, June 1997 (2) 4 Recognition of third parties Proposed three tier approach: accreditation of training organizations, approved courses and professional certification The importance of BS 7799 Action Test marketing and training Develop training matrix Feedback Relation to procurement activity

5 The Alliance (STA) 5 Collaboration between The Open Group and Aid to Industry Working to run a series of briefing seminars in March/April 98 timed to benefit from the publicity arising out of the BISS 98 Survey Working on Set of Courses to be given from May 98 onwards related to Security Breaches, Security Management and solutions based on IT Security Standards Treated as a pilot project and open to other participants

6 AID TO INDUSTRY 6 Represented by Vernon Poole and Stan Dormer Formed in 1982 Specialist training organisation especially oriented to audit professionals Now owned by Deliotte & Touche

7 STA - Proposed Courses (1) 7 Half day courses related to BISS 98 and Security Management Security Incident Reporting Impact of Security Breaches Cost of Security Breaches Contingency Plans/Standards Information Security Policies Information Security Standards and Procedures Communications Controls

8 STA - Proposed Courses (2) 8 One or two day courses Establishing an Effective Information Security Guide Establishing a Distributed Security Framework Establishing Baseline Security Services Defining and Buying Secure Open Systems New and Emerging Open System Security Technologies

9 STA - Course Delivery 9 Courses would be grouped in series to provide for three to four days training at one time. Offered publically in London, N. England and Edinburgh from May 98 Offered for in-house training Roll out - Europe and beyond Offer under license to other training organizations through proposed three tier accreditation scheme

10 Security Briefings at Member Meetings 10 Amsterdam - Security Briefing Sessions on Security Management (Stan Dormer) and Single Sign On (Pierre Noel) Objectives Feedback San Diego - Security Briefing Sessions on Security Management and CDSA Dependent upon experience from Amsterdam Roll out alongside the Alliance

11 Relation to BS Alliance (STA) seminars and courses, and Security Briefings at Member Meetings both reference BS 7799 Need to position alongside BS 7799 to ensure that TOG and the STA add unique value and promote the benefits adopting and implementing IT standards such as CDSA Question the value of TOG attempting to compete directly with consultancy firms and others offering services relating to BS 7799 Accreditation.

12 STA Training Matrix 12 Parameters: Level of the audience Type of practitioner Subject area Map against proposed activities Develop course curricula that could also be used as the basis of approved courses under the three tier accreditation scheme

13 Checklist of topics to cover (1) 13 discuss the security issues facing commercial organisations discuss the importance and development of security policies describe how a generally-accepted code of practice for information security can benefit the business outline a generally accepted technical architecture for information security can be applied to support the security policy and codes of practice such as BS7799

14 Checklist of topics to cover (2) 14 identify commercially-developed common standards for security services that support the architecture and the practical implementation of codes of practice such as BS7799 illustrate how these standards can be used in an effective commercial procurement and deployment strategy in order to achieve improved corporate security to combat identified risks and vulnerabilities

15 Checklist of topics to cover (3) 15 cost effective deployment with demonstrable cost benefits improved flexibility and scalability of the corporate infrastructure to respond to changing business needs improved portability and interoperability between products in order to reduce the risk of "product lock-in" avoidance of the security through obscurity" syndrome

16 Next Action 16 Feedback from Amsterdam Look at CDSA training opportunities including webbased training possibilities Refine and enlarge the training matrix Deliver the pilot seminars and courses through STA Re-examine the Business Case Extend TOG activities beyond the UK Offer licenses and/or engage other organizations in STA Establish the three tier accreditation scheme

Risk Analysis and the Security Survey

Risk Analysis and the Security Survey Risk Analysis and the Security Survey Fourth Edition James F. Broder Eugene Tucker ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann

More information

C-I Factor. Bringing creative businesses together with investment. Appointment of Creative Industries Access to Finance Advisory Board Members

C-I Factor. Bringing creative businesses together with investment. Appointment of Creative Industries Access to Finance Advisory Board Members C-I Factor Bringing creative businesses together with investment Appointment of Creative Industries Access to Finance Advisory Board Members 1 C-I Factor: Seeking Appointment of Creative Industries Access

More information

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach. Gunnar Wahlgren 1, Stewart Kowalski 2 Stockholm University 1: ([email protected]), 2: ([email protected]) ABSTRACT

More information

Paul Vlissidis Group Technical Director NCC Group plc [email protected]

Paul Vlissidis Group Technical Director NCC Group plc paulv@nccgroup.com Managing IT Fraud Using Ethical Hacking Paul Vlissidis Group Technical Director NCC Group plc [email protected] Agenda Introductions Context for Ethical Hacking Effective use of ethical hacking in fraud

More information

Cloud Security Introduction and Overview

Cloud Security Introduction and Overview Introduction and Overview Klaus Gribi Senior Security Consultant [email protected] May 6, 2015 Agenda 2 1. Cloud Security Cloud Evolution, Service and Deployment models Overview and the Notorious

More information

Leveraging SANS and NIST to Evaluate New Security Tools

Leveraging SANS and NIST to Evaluate New Security Tools Leveraging SANS and NIST to Evaluate New Security Tools Agenda About TaaSera A Problem to Solve Overview of NIST Cybersecurity Framework Overview of SANS CSC-20 Call to Action Conclusion Q&A Company Founded

More information

ITIL v3 Service Manager Bridge

ITIL v3 Service Manager Bridge ITIL v3 Service Manager Bridge Course Length: 5 Days Course Overview This 5 day hands on, certification training program enables ITIL Version 2 certified Service Managers to upgrade their Service Manager

More information

In partnership with. Food & Drink A fresh approach to risk management

In partnership with. Food & Drink A fresh approach to risk management In partnership with Food & Drink A fresh approach to risk management A thriving sector... In these difficult economic times the Food & Drink industry is a refreshing example of a sector that is expanding.

More information

G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps

G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps G-Cloud II Services Service Definition Accenture Cloud SaaS Implementation Services Google Apps 1 Table of Contents 1. Scope of our Services... 3 2. Approach... 4 3. Assets and Tools... 5 4. Outcomes...

More information

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics

Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics Programme Specification and Curriculum Map for MSc Electronic Security and Digital Forensics 1. Programme title Electronic Security & Digital Forensics 2. Awarding institution Middlesex University 3. Teaching

More information

Critical Environment Risk Management

Critical Environment Risk Management DATA CENTRE SECTOR Critical Environment Risk Management for Data Centres Exceptional Service, Exceptional People Data centre experience Norland supports some of the world s leading enterprise data centres

More information

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

AN OVERVIEW OF INFORMATION SECURITY STANDARDS AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

Ubertas Cloud Services: Service Definition

Ubertas Cloud Services: Service Definition Ubertas Cloud Services: Service Definition February 2013 Innovation. Power. Trust. Contents 1. About Ubertas... 2 Our Company... 2 Our Approach to Service Delivery... 2 Our Partner Network & the UK Cloud

More information

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master Securing The Cloud Foundational Best Practices For Securing Cloud Computing Scott Clark Agenda Introduction to Cloud Computing What is Different in the Cloud? CSA Guidance Additional Resources 2 What is

More information

Cloud Vendor Evaluation

Cloud Vendor Evaluation Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business

More information

Roles & Grades Rate Cards and Applicable SFIA Skills

Roles & Grades Rate Cards and Applicable SFIA Skills Roles & s Rate Cards and Applicable Consultant Day Rate Card Consultant Day Rate Lead 900.00 Senior 800.00 Junior 0.00 CLAS Consultant and Competencies Lead CLAS Consultant Lead CLAS Consultant IT Governance

More information

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13 Cyber Security Consultancy Standard Version 0.2 Crown Copyright 2015 All Rights Reserved Page 1 of 13 Contents 1. Overview... 3 2. Assessment approach... 4 3. Requirements... 5 3.1 Service description...

More information

ITIL Service Lifecycle Design

ITIL Service Lifecycle Design ITIL Service Lifecycle Design Course Details Course Code: Duration: Notes: ITILSL-Des 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based on

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER

Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Technical Editor Bill Meine ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

FM & SECURITY SOLUTIONS. SSS Managed Services. Impartial, innovative, involved

FM & SECURITY SOLUTIONS. SSS Managed Services. Impartial, innovative, involved FM & SECURITY SOLUTIONS SSS Managed Services Impartial, innovative, involved SSS MANAGED SERVICES INTRODUCTION SSS Managed Services provides a range of flexible, scalable and service-led solutions for

More information

ISO27032 Guidelines for Cyber Security

ISO27032 Guidelines for Cyber Security ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance

More information

SALES & MARKETING TRAINING COURSES. www.aztech.ae 17-OCT-15

SALES & MARKETING TRAINING COURSES. www.aztech.ae 17-OCT-15 SALES & MARKETING TRAINING COURSES www.aztech.ae 17-OCT-15 AZTech Training & Consultancy is a leading international provider of training courses, seminars, and learning solutions. We deliver a wide range

More information

Bring Your Own Device (BYOD) and Mobile Device Management

Bring Your Own Device (BYOD) and Mobile Device Management Bring Your Own Device (BYOD) and Mobile Device Management Intivix.com (415) 543 1033 PROFESSIONAL IT SERVICES FOR BUSINESSES OF ALL SHAPES AND SIZES People are starting to expect the ability to connect

More information

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT www.intivix.com (415) 543 1033 HELP TEAM MEMBERS TO COLLABORATE MORE EASILY FROM ANYWHERE. People are starting to expect the ability to connect

More information

ITIL: Service Design

ITIL: Service Design ITIL: Service Design Course Course Chapter 01 - Course Lesson: Course Organization Welcome to the Course! Mentoring Community s Why Are You Here? Using Bloom's Taxonomy What do you Expect? Housekeeping

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

Launch of the National Clinical Utilisation Review Framework

Launch of the National Clinical Utilisation Review Framework Launch of the National Clinical Utilisation Review Framework Guide for Clinical Commissioning Groups Publications Gateway Number: 03917 Launch of the National Clinical Utilisation Review Framework Guide

More information

Data Sheet Innate Timesheets

Data Sheet Innate Timesheets Data Sheet Innate Timesheets Software for timesheets, progress reporting & expenses. Innate Timesheets enables you to record people's time and expenses and other related data, using webbased sheets. Because

More information

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected]

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab Qing.Liu@chi.frb.org Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab [email protected] 1 Disclaimers This presentation provides education on Cloud Computing and its security

More information

Our risk management framework Reviewed quarterly by our executive committee

Our risk management framework Reviewed quarterly by our executive committee Our risk management framework Reviewed quarterly by our executive committee Our risk management framework helps us identify and mitigate risks. It is reviewed quarterly and updated to reflect changes particularly

More information

Guidance. Injection: Crafts Council s business development scheme Guidelines for Applicants. Crafts Council Registered Charity Number 280956

Guidance. Injection: Crafts Council s business development scheme Guidelines for Applicants. Crafts Council Registered Charity Number 280956 Guidance Injection: Crafts Council s business development scheme Guidelines for Applicants Crafts Council Registered Charity Number 280956 01 Injection: Crafts Council s business development scheme Guidelines

More information

ENISA and Cloud Security

ENISA and Cloud Security ENISA and Cloud Security Rossen Naydenov Network Information Security Officer Critical Information Infrastructure Protection Department - ENISA European Union Agency for Network and Information Security

More information

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory

Perspectives on Cloud Computing and Standards. Peter Mell, Tim Grance NIST, Information Technology Laboratory Perspectives on Cloud Computing and Standards Peter Mell, Tim Grance NIST, Information Technology Laboratory Standardization and Cloud Computing Cloud computing is a convergence of many technologies Some

More information

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter

Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute

More information

TMMi Case Study. Methodology. Scope. Use TMMi to do a gap analysis for an independent

TMMi Case Study. Methodology. Scope. Use TMMi to do a gap analysis for an independent TMMi Case Study TMMi Case Study Presentation Use TMMi to do a gap analysis for an independent testing organisation Involves 2 assessors for 5 days Objectives Determine how well the organisation is meeting

More information

WEBINAR INTRODUCTION TO COMMISSIONING BETTER OUTCOMES, SOCIAL OUTCOMES FUND AND THE SOCIAL FINANCE AND LOCAL GOVERNMENT ASSOCIATION SUPPORT CONTRACT

WEBINAR INTRODUCTION TO COMMISSIONING BETTER OUTCOMES, SOCIAL OUTCOMES FUND AND THE SOCIAL FINANCE AND LOCAL GOVERNMENT ASSOCIATION SUPPORT CONTRACT WEBINAR INTRODUCTION TO COMMISSIONING BETTER OUTCOMES, SOCIAL OUTCOMES FUND AND THE SOCIAL FINANCE AND LOCAL GOVERNMENT ASSOCIATION SUPPORT CONTRACT 17 TH OCTOBER 2013 Tom Symons [email protected]

More information

Guideline on Implementing Cloud Identity and Access Management

Guideline on Implementing Cloud Identity and Access Management CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National

More information

Information Security: Cloud Computing

Information Security: Cloud Computing Information Security: Cloud Computing Simon Taylor MSc CLAS CISSP CISMP PCIRM Director & Principal Consultant All Rights Reserved. Taylor Baines Limited is a Registered Company in England & Wales. Registration

More information

IBM Data Security Services for endpoint data protection endpoint encryption solution

IBM Data Security Services for endpoint data protection endpoint encryption solution Protecting data on endpoint devices and removable media IBM Data Security Services for endpoint data protection endpoint encryption solution Highlights Secure data on endpoint devices Reap benefits such

More information

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT

SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT SCOTTISH CENSUS INDEPENDENT SECURITY REVIEW REPORT Issue 1.0 Date 24/03/2011 Logica is a business and technology service company, employing 39,000 people. It provides business consulting, systems integration

More information

Helping the police to support people with vulnerabilities

Helping the police to support people with vulnerabilities Helping the police to support people with vulnerabilities Contents Foreword 1 Mental Health Crisis Care Concordat 3 Mental Health Street Triage 4 Liaison and Diversion 5 Multi Agency Working 6 Drugs 7

More information

Cloud Computing in a Regulated Environment

Cloud Computing in a Regulated Environment Computing in a Regulated Environment White Paper by David Stephenson CTG Regulatory Compliance Subject Matter Expert February 2014 CTG (UK) Limited, 11 Beacontree Plaza, Gillette Way, READING, Berks RG2

More information

Information Security Management System (ISMS) Policy

Information Security Management System (ISMS) Policy Information Security Management System (ISMS) Policy April 2015 Version 1.0 Version History Version Date Detail Author 0.1 18/02/2015 First draft Andy Turton 0.2 20/02/2015 Updated following feedback from

More information

DISCUSSION PAPER ON SEMANTIC AND TECHNICAL INTEROPERABILITY. Proposed by the ehealth Governance Initiative Date: October 22 nd, 2012

DISCUSSION PAPER ON SEMANTIC AND TECHNICAL INTEROPERABILITY. Proposed by the ehealth Governance Initiative Date: October 22 nd, 2012 DISCUSSION PAPER ON SEMANTIC AND TECHNICAL INTEROPERABILITY Proposed by the ehealth Governance Initiative Date: October 22 nd, 2012 Introduction Continuity of care is a key priority for modern healthcare

More information

Safeguarding life, property and the environment

Safeguarding life, property and the environment DNV Healthcare Safeguarding life, property and the environment DNV Healthcare Contact us More information about our organisation and the services we offer can be found at our website dnv.com/healthcare

More information

The Internal Audit fraud challenge Prevention, protection, detection

The Internal Audit fraud challenge Prevention, protection, detection The Internal Audit fraud challenge Prevention, protection, detection Contents Introduction to survey 1 Key findings 2 What are the views of senior management? 3 Adequately resourced? 6 Current trends and

More information

Online/Cloud Services Trust challenges & eidentity-aspects

Online/Cloud Services Trust challenges & eidentity-aspects Online/Cloud Services Trust challenges & eidentity-aspects Erik R. van Zuuren, Director Deloitte AERS Belgium Global Forum Brussels Nov 07/08, 2011 Member of Deloitte Touche Tohmatsu Agenda Weather Forecast

More information

Delivering our Vision 5 Year Programme A Performance Management Framework Tier 1: Strategic goals and objectives RIGHT CARE, RIGHT PLACE, RIGHT TIME

Delivering our Vision 5 Year Programme A Performance Management Framework Tier 1: Strategic goals and objectives RIGHT CARE, RIGHT PLACE, RIGHT TIME Delivering our Vision 5 Year Programme A Performance Management Framework Tier 1: Strategic goals and objectives RIGHT CARE, RIGHT PLACE, RIGHT TIME To lead in the provision of emergency care; offering

More information

UKCP Standards of Education and Training

UKCP Standards of Education and Training UKCP Standards of Education and Training Guidelines for Section and Institutional Members for the Development of Standards of Supervision for Child Psychotherapists UKCP May 2008 This document is copyright

More information

ediscovery G-Cloud V Service Definition Lot 4 SCS Contact us: Danielle Pratt Tel: 0207 444 4080 Email: [email protected].

ediscovery G-Cloud V Service Definition Lot 4 SCS Contact us: Danielle Pratt Tel: 0207 444 4080 Email: G-Cloud@esynergy-solutions.co. ediscovery G-Cloud V Service Definition Lot 4 SCS Tender Validity Period: 120 days from 10/04/14 Contact us: Danielle Pratt Email: [email protected] Contents About... 1 Specialist Cloud

More information

ehealth Architecture Principles

ehealth Architecture Principles ehealth Architecture Principles Version 3.0 June 2009 Document Control Details Title: ehealth Architecture Principles Owner: Head of Architecture and Design, Scottish Government ehealth Directorate Version:

More information

ACCA is the global body for professional accountants with 428,000 trainees and 162,000 qualified members in 170 countries.

ACCA is the global body for professional accountants with 428,000 trainees and 162,000 qualified members in 170 countries. About ACCA ACCA is the global body for professional accountants with 428,000 trainees and 162,000 qualified members in 170 countries. Over 40,000 ACCA members work in accounting and professional services

More information

On Premise Vs Cloud: Selection Approach & Implementation Strategies

On Premise Vs Cloud: Selection Approach & Implementation Strategies On Premise Vs Cloud: Selection Approach & Implementation Strategies Session ID#:10143 Prepared by: Praveen Kumar Practice Manager AST Corporation @Praveenk74 REMINDER Check in on the COLLABORATE mobile

More information

Expert Group on Cloud Computing Services and Standards ( EGCCSS ) Formation of Working Groups

Expert Group on Cloud Computing Services and Standards ( EGCCSS ) Formation of Working Groups For Discussion on 27 May 2014 Paper EGCCSS-6-3 Expert Group on Cloud Computing Services and Standards ( EGCCSS ) Formation of Working Groups Purpose To propose the setting up of two Working Groups under

More information

INFRASTRUCTURE ARCHITECTURE BLUEPRINT

INFRASTRUCTURE ARCHITECTURE BLUEPRINT INFRASTRUCTURE ARCHITECTURE BLUEPRINT MESYUARAT PENGURUS-PENGURUS ICT SEKTOR AWAM BIL.3 TAHUN 2010 26 Oktober 2010 BERSAMA MELAKSANA TRANSFORMASI Table of Content Introduction Current Environment Overview

More information

ISO/IEC/IEEE 29119 The New International Software Testing Standards

ISO/IEC/IEEE 29119 The New International Software Testing Standards ISO/IEC/IEEE 29119 The New International Software Testing Standards Stuart Reid Testing Solutions Group 117 Houndsditch London EC3 UK Tel: 0207 469 1500 Fax: 0207 623 8459 www.testing-solutions.com 1 Stuart

More information

DELIVERING OUR STRATEGY

DELIVERING OUR STRATEGY www.lawsociety.org.uk DELIVERING OUR STRATEGY Our three year plan 2015 2018 >2 > Delivering our strategy Catherine Dixon Chief executive Foreword Welcome to our three year business plan which sets out

More information

Cloud Platform Development Services

Cloud Platform Development Services Methods Digital GCloud Service Definition HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL Midlands Office: Pure Offices, Lake

More information

Frameworks for IT Management

Frameworks for IT Management Frameworks for IT Management Copyright protected. Use is for Single Users only via a VHP Approved License. For information and printed versions please see www.vanharen.net 18 ITIL - the IT Infrastructure

More information

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015 Identity & Management The Cloud Perspective Andrea Themistou 08 October 2015 Agenda Cloud Adoption Benefits & Risks Security Evolution for Cloud Adoption Securing Cloud Applications with IAM Securing Cloud

More information

People Director Job description

People Director Job description People Director Job description About Teaching Leaders Teaching Leaders is an innovative not-for-profit organisation whose mission is to address educational disadvantage by growing a movement of outstanding

More information

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services

Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...

More information

Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems

Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems eenviper White Paper #4 Cloud Computing and Government Services August 2013 Serdar Yümlü SAMPAŞ Information & Communication Systems 1 Executive Summary Cloud computing could revolutionise public services

More information

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé

NHS HDL (2006)41 abcdefghijklm. = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé NHS HDL (2006)41 abcdefghijklm = eé~äíü=aéé~êíãéåí= = aáêéåíçê~íé=çñ=mêáã~êó=`~êé=~åç=`çããìåáíó=`~êé Dear Colleague NHSSCOTLAND INFORMATION SECURITY POLICY Summary 1. NHSScotland IT Security Policy was

More information

THE STRATEGIC POLICING REQUIREMENT. July 2012

THE STRATEGIC POLICING REQUIREMENT. July 2012 THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12

More information

ICT and Information Security Resources

ICT and Information Security Resources Methods GCloud Service Definition ICT and Information Security Resources HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL t: +44

More information

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project

Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Information Management Advice 35: Implementing Information Security Part 1: A Step by Step Approach to your Agency Project Introduction This Advice provides an overview of the steps agencies need to take

More information

NIST Cyber Security Activities

NIST Cyber Security Activities NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division

More information

IMA ANNUAL CONFERENCE 2014

IMA ANNUAL CONFERENCE 2014 IMA ANNUAL CONFERENCE 2014 The Oxford Hotel, Oxford 12 th & 13 th May 2014 Conference sponsored by IMA ANNUAL CONFERENCE 2014 The Oxford Hotel, Oxford 12 th & 13 th May 2014 The new framework for money

More information

How to gain and maintain ISO 27001 certification

How to gain and maintain ISO 27001 certification Public How to gain and maintain ISO 27001 certification Urpo Kaila, Head of Security CSC IT Center for Science ltd. [email protected], [email protected] GÉANT SIG ISM 1 st Workshop, 2015-05-12, imperial.ac.uk

More information

Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276

Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276 Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276 702500 [email protected] Agenda Background and

More information

G Cloud III Framework Lot 4 (SCS) Project Management

G Cloud III Framework Lot 4 (SCS) Project Management G Cloud III Framework Lot 4 (SCS) Project Management Contents Executive Summary 3 Project Management 4 Why Deloitte? 6 SFIA Rate Card 7 Contact 8 Service Definition (a) to (p) 9 Executive Summary PROJECT

More information

BUILDING THE BRITISH BUSINESS BANK: INVESTMENT PROGRAMME. Question & Answers FEBRUARY 2014

BUILDING THE BRITISH BUSINESS BANK: INVESTMENT PROGRAMME. Question & Answers FEBRUARY 2014 BUILDING THE BRITISH BUSINESS BANK: INVESTMENT PROGRAMME Question & Answers FEBRUARY 2014 Contents Contents... 2 Submission... 3 Target Market... 4 Match Funding... 4 Pari Passu Terms... 5 Legal, Structure

More information

Cloud Services Overview

Cloud Services Overview Cloud Services Overview John Hankins Global Offering Executive Ricoh Production Print Solutions May 23, 2012 Cloud Services Agenda Definitions Types of Clouds The Role of Virtualization Cloud Architecture

More information

Dedicated Hosted Exchange 2013

Dedicated Hosted Exchange 2013 About inty Dedicated Exchange Server 2013 The inty Dedicated Exchange 2013 Solution is a fully managed implementation with the following features: High-availability and built to Microsoft s reference architecture

More information

THE UNIVERSITY OF EDINBURGH. PROGRAMME SPECIFICATION FOR MSc Science and Technology Policy and Management 1

THE UNIVERSITY OF EDINBURGH. PROGRAMME SPECIFICATION FOR MSc Science and Technology Policy and Management 1 THE UNIVERSITY OF EDINBURGH PGBoS/Jan07/03 PROGRAMME SPECIFICATION FOR MSc Science and Technology Policy and Management 1 1) Awarding Institution: The University of Edinburgh 2) Teaching Institution: The

More information

Interoute Virtual Data Centre. Hands on cloud control.

Interoute Virtual Data Centre. Hands on cloud control. Interoute Virtual Data Centre. Hands on cloud control. Scale your computing resource on demand Choose where in Europe you want your data Europe s most trusted and secure network www.interoute.com/vdc Interoute

More information

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES

PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Public Health (Health Visiting, School Nursing or District Nursing) Award Postgraduate Diploma/MSc School School of Health Sciences

More information

Shropshire Highways Draft Asset Management and Communications Strategy and Implications of Department for Transport Incentivised funding

Shropshire Highways Draft Asset Management and Communications Strategy and Implications of Department for Transport Incentivised funding Committee and Date Cabinet 14 th October 2015 Shropshire Highways Draft Asset Management and Communications Strategy and Implications of Department for Transport Incentivised funding Responsible Officer

More information