ISO/IEC Information & ICT Security and Governance Standards in practice. Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT
|
|
- Eustace Marsh
- 8 years ago
- Views:
Transcription
1 ISO/IEC Information & ICT Security and Governance Standards in practice Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT June 4, 2009
2 ISO and IEC ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. National Bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organization to deal with particular fields of technical activity. ISO is made up of 159 national body members which are divided into three categories. June 4, 2009 Titre 2
3 ISO and IEC form JTC1 In the field of information technology, ISO and IEC have established a Joint Technical Committee 1: ISO/IEC JTC 1. Draft International Standards adopted by the joint technical committees are circulated to the national bodies for voting. Publication as an International Standard requires approval by at least 75% of the national bodies casting a vote. June 4, 2009 Titre 3
4 JTC1 Areas of Expertise, Mirrored in Canada ISO/IEC CAC/JTC1 - Canadian Advisory Committees for the Joint Technical Committee 1 of ISO/IEC CAC/JTC1 Privacy Group CAC/JTC1/SC 2 - Coded Character CAC/JTC1/SC 6 - Telecommunications and Information Exchange Between Systems CAC/JTC1/SC17 - Identification Cards and Related Devices (ANSI X3B.10) CAC/JTC1/SC22 - Programming Languages, Their Environments and System Software Interfaces CAC/JTC1/SC24 - Computer Graphics and Image Processing CAC/JTC1/SC25 - Interconnection of Information Technology Equipment CAC/JTC1/SC27 - IT Security Techniques CAC/JTC1/SC31 - Automatic Identification and Data Capture Techniques CAC/JTC1/SC32 - Data Management and Interchange CAC/JTC1/SC34 - Document Description and Processing Languages (includes the SGML family of standards) CAC/JTC1/SC35 - User Interfaces CAC/JTC1/SC36 - Information Technology for Learning, Education and Training CAC/JTC1/SC37 - Biometrics CAC/JTC1/SWG - Accessibility CAC/JTC1/TCIT - Information Technology CAC/JTC1/WG6 - Corporate Governance of IT June 4, 2009 Séance d accueil 4
5 ISO/IEC/JTC1/SC27 SC27 Programme of Work Area of Work: The development of standards for the protection of information and ICT. This includes generic methods, techniques and guidelines to address both security and privacy aspects, such as: * Security requirements capture methodology; * Management of information and ICT security; in particular information security management systems (ISMS), security processes, security controls and services; * Cryptographic and other security mechanisms, including but not limited to mechanisms for protecting the accountability, availability, integrity and confidentiality of information; * Security management support documentation including terminology, guidelines as well as procedures for the registration of security components; * Security aspects of identity management, biometrics and privacy; * Conformance assessment, accreditation and auditing requirements in the area of information security; * Security evaluation criteria and methodology. SC 27 engages in active liaison and collaboration with appropriate bodies to ensure the proper development and application of SC 27 standards and technical reports in relevant areas. 39 National Bodies constitute ISO/IEC/JTC 1/SC27, where at least a 75% approval is required for IS 7 décembre 2007 Séance d accueil 5
6 Specific Domains of Expertise in IT Security CAC/JTC1/SC27 - IT Security Techniques Working Group 1: "Information Security Management Systems" WG 1 covers the development of ISMS (Information Security Management System, ISO/IEC 27001, ISO/IEC 27002) standards and guidelines family. Working Group 2: "Cryptography and Security Mechanisms" WG 2 covers both cryptographic and non-cryptographic techniques and mechanism Working Group 3: "Evaluation Criteria of Information Security" WG 3 covers IT Security evaluation and certification of IT systems, components, and products (such as Common Criteria for Evaluation). This will include consideration of computer networks, distributed systems, associated application services, etc. Working Group 4: "Security controls and services" WG 4 covers the development and maintenance of standards and guidelines addressing services and applications supporting the implementation of control objectives and controls as defined in ISO/IEC (such as Network Security, CyberSecurity, Business Continuity, etc). Working Group 5: "Identity Mgmt. & Privacy Technologies" WG 5 covers the development and maintenance of standards and guidelines addressing security aspects of identity management, biometrics and the protection of personal data. June 4, 2009 Séance d accueil 6
7 Some Published and «in-development» Standards ISO/IEC 27000: Information security management systems - Overview and vocabulary ISO/IEC 27001: Information security management systems - Requirements ISO/IEC 27002: Code of practice for information security management ISO/IEC 27004: Information security management measurements ISO/IEC 27005: Information security risk management (replaces ISO/IEC 13335) ISO/IEC 27006: International accreditation guidelines for the accreditation of bodies operating certification / Registration of information security management systems ISO/IEC 27010: Information security management for inter-sector communications (for critical infrastructure) ISO/IEC 27013: Guidelines for integration implementation of ISO/IEC & ISO/IEC ISO/IEC 27014: Information security governance framework ISO/IEC 27033: Network security (replaces ISO/IEC 18028) ISO/IEC 15408: Evaluation criteria for IT security (AKA, Common Criteria) ISO/IEC 29147: Responsible vulnerability disclosure ISO/IEC 27014: A Framework for Corporate Governance of IT June 4, 2009 Séance d accueil 7
8 Some Published and «in-development» Standards (more) ISO/IEC 27031: ICT readiness for business continuity ISO/IEC 27032: Guidelines for CyberSecurity ISO/IEC 27033: Network security (replaces ISO/IEC 18028) ISO/IEC 27034: Application security ISO/IEC 24760: A framework for identity management ISO/IEC 29100: A privacy framework ISO/IEC 29101: A privacy reference architecture ISO/IEC 29146: A framework for access management June 4, 2009 Séance d accueil 8
9 Base SC27 Standards that Drive Organizations to Address Security ISO/IEC 27005: Information security risk management (RISK ASSESSMENT REQUIREMENTS and MANAGEMENT) ISO/IEC 27002: Code of practice for information security management (SECURITY GUIDELINES) ISO/IEC 27001: Information security management systems Requirements (CERTIFICATION) June 4, 2009 Séance d accueil 9
10 General Concepts for these Standards ISO/IEC 27005: This International Standard provides guidelines for Information Security Risk Management in an organization, supporting in particular the requirements of an ISMS according to ISO/IEC ISO/IEC 27002: This International Standard establishes guidelines and general principles for initiating, implementing, maintaining, and improving information security management in an organization. The objectives outlined in this International Standard provide general guidance on the commonly accepted goals of information security management. ISO/IEC 27001: This International Standard has been prepared to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an Information Security Management System (ISMS). The adoption of an ISMS should be a strategic decision for an organization. This International Standard can be used in order to assess conformance by interested internal and external parties. June 4, 2009 Séance d accueil 10
11 Risk Management Model June 4, 2009 Séance d accueil 11
12 Risk Management Model June 4, 2009 Séance d accueil 12
13 What it Means to Your Organization Adopting and Implementing an Information Security Management System is a top or board level decision. It is a top-down process based on Risk Management It runs through your Enterprise Architecture It affects everyone in your organization It needs an audit and verification process It requires that you PLAN, DO, CHECK and you IMPROVE June 4, 2009 Séance d accueil 13
14 Fundamental Changes to Your Organization Your organization will go through fundamental work changes when implementing an ISMS It requires Change Management within your organization It involves documenting your processes and procedures It requires an auditable trail and logging of your activities It often demands a change from your suppliers and the organizations you do business with Ensuring Security is Not Just IT Projects and Processes, it s Organizational Driven Initiatives and Directives June 4, 2009 Séance d accueil 14
15 Information Security Governance Architecture June 4, 2009 Séance d accueil 15
16 How it fits June 4, 2009 Séance d accueil 16
17 Government Example Government of Quebec: Established a secure communications channel between ministries and awarded the management contract to the organization that agreed to implement and certify against ISO/IEC Asks that the IT arm of its Health and Social Services require that its critical suppliers certify against ISO/IEC Currently undergoing restructuring of its CSIRT to certify against ISO/IEC June 4, 2009 Séance d accueil 17
18 New Domain of Expertise for JTC 1 CAC/JTC1/WG6 - Corporate Governance of IT Provides guiding principles for directors of organizations (including owners, board members, directors, partners, senior executives, or similar) on the effective, efficient, and acceptable use of Information Technology within their organizations. This applies to the governance of management processes (and decisions) relating to the information and communication services used by an organization. These processes could be controlled by IT specialists within the organization or external service providers, or by business units within the organization. June 4, 2009 Séance d accueil 18
19 QUESTIONS & THANK YOU!!! Charles P. Provencher Senior Advisor, IT Security & Conformity Nurun Inc #25072 June 4, 2009 Séance d accueil 19
Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты?
Entschuldigen Sie mich, I did not understand, parlez-vous IT Методы обеспечения защиты? World Standards Day 2015 ILNAS 2015-10-14 Cédric Mauny, Vice-Chairman of Luxembourg National Committee ISO/IEC JTC1
More informationGUIDE 62. General requirements for bodies operating assessment and certification/registration of quality systems
GUIDE 62 General requirements for bodies operating assessment and certification/registration of quality systems First edition 1996 ISO/IEC GUIDE 62:1996(E) Contents Pag e Section 1: General 1 1.1 Scope
More informationAn Overview of ISO/IEC 27000 family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
More informationJTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security
More informationThis is a preview - click here to buy the full publication TECHNICAL REPORT INFORMATION TECHNOLOGY HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL
TECHNICAL REPORT ISO/IEC TR 15067-4 First edition 2001-06 INFORMATION TECHNOLOGY HOME ELECTRONIC SYSTEM (HES) APPLICATION MODEL Part 4: Security system for HES ISO/IEC 2001 All rights reserved. Unless
More informationInformation Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
More informationINFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA By THAIB MUSTAFA, CHAIRMAN TECHNICAL COMMITTEE FOR INFORMATION SECURITY (TC/G/5) INDUSTRY STANDARDS COMMITTEE FOR INFORMATION TECHNOLOGY, COMMUNICATION
More informationIdentity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy
Identity Management Initiatives in identity management and emerging standards Presented to Fondazione Ugo Bordoni Rome, Italy November 18, 2008 Teresa Schwarzhoff Computer Security Division Information
More informationWorking Group 5 Identity Management and Privacy Technologies within ISO/IEC JTC 1/SC 27 IT Security Techniques
Working Group 5 Identity Management and Privacy Technologies within ISO/IEC JTC 1/SC 27 IT Security Techniques Joint Workshop of ISO/IEC JTC 1/SC 27/WG 5, ITU-T SG17/Q.6, and FIDIS on Identity Management
More informationDRAFT ÖNORM ISO/IEC 27005
DRAFT ÖNORM ISO/IEC 27005 Edition: 2013-07-01 Information technology Security techniques Information security risk management (ISO/IEC 27005:2011) Informationstechnologie Sicherheitstechnik Informationssicherheits-
More informationInformation technology Security techniques Information security management systems Overview and vocabulary
INTERNATIONAL STANDARD ISO/IEC 27000 Third edition 2014-01-15 Information technology Security techniques Information security management systems Overview and vocabulary Technologies de l information Techniques
More informationWalter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this field.
27, IT Security Techniques An Interview with Walter Fumy, Chairman of ISO/IEC JTC 1/SC Walter Fumy discusses the importance of IT security standards in today s world and the role that SC 27 plays in this
More informationISO/IEC 90003:2004 covers all aspects
Huge potential user base for ISO/IEC 90003 the state of the art for improving quality in software engineering ISO/IEC 90003:2004, Software engineering Guidelines for the application of ISO 9001: 2000 to
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 14662 First edition Information Technologies - Open-edi reference model Technologie de l'information - Modèle de référence EDI-ouvert Reference number Page 2 Contents Foreword...
More informationInternational Software & Systems Engineering. Standards. Jim Moore The MITRE Corporation Chair, US TAG to ISO/IEC JTC1/SC7 James.W.Moore@ieee.
This presentation represents the opinion of the author and does not present positions of The MITRE Corporation or of the U.S. Department of Defense. Prepared for the 4th Annual PSM Users Group Conference
More informationSecurity and Privacy Controls for Federal Information Systems and Organizations
NIST Special Publication 800-53 Revision 4 Security and Privacy Controls for Federal Information Systems JOINT TASK FORCE TRANSFORMATION INITIATIVE This document contains excerpts from NIST Special Publication
More informationMaintaining Herd Communication - Standards Used In IT And Cyber Security. Laura Kuiper
Maintaining Herd Communication - Standards Used In IT And Cyber Security Laura Kuiper So what is Cyber Security? According to ITU-T X.1205 Cybersecurity is the collection of tools, policies, security concepts,
More informationDe Nieuwe Code voor Informatiebeveiliging
De Nieuwe Code voor Informatiebeveiliging Piet Donga, ING Voorzitter NEN NC 27 - IT Security 1 Agenda Standardisation of Information security The new Code of Practice for Information Security The Code
More informationThis document is a preview generated by EVS
TECHNICAL REPORT ISO/IEC TR 20000-9 First edition 2015-02-15 Information technology Service management Part 9: Guidance on the application of ISO/IEC 20000-1 to cloud services Technologies de l information
More informationRelationship to Software Engineering Standards
Chapter3 Relationship to Software Engineering Standards STANDARDS ORGANIZATIONS Standards organizations are bodies, organizations, and institutions that produce standards. These organizations develop standards
More informationPotential standardization items for the cloud computing in SC32
WG2 N1665 Potential standardization items for the cloud computing in SC32 ISO/IEC JTC 1/SC 32 Plenary Meeting, Berlin, Germany, June 2012 Sungjoon Lim, Korea Database Agency (KDB) Dongwon Jeong, Kunsan
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 27033-1 Second edition 2015-08-15 Information technology Security techniques Network security Part 1: Overview and concepts Technologies de l information Techniques de sécurité
More informationRadio Spectrum and Technical Standards Advisory Committee
Radio Spectrum and Technical Standards Advisory Committee SSAC Paper 7/2015 for information Update on Testing and Certification of Telecommunications Equipment Office of the Communications Authority 15
More informationES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS CONFERENCE
29e CONFÉRE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIV ES ET DE LA VIE PRIVÉE E 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS CONFERE Standards Briefing
More informationHow To Protect Your Computer System From Being Hacked
INTERNATIONAL STANDARD ISO/IEC 27002 Second edition 2013-10-01 Information technology Security techniques Code of practice for information security controls Technologies de l information Techniques de
More informationTECHNICAL SPECIFICATION
TECHNICAL SPECIFICATION IEC/TS 62443-1-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 1-1: Terminology, concepts and models INTERNATIONAL ELECTROTECHNICAL
More informationInformation Technology Security Program
Information Technology Security Program Office of the CIO December, 2008 1 AGENDA What is it? Why do we need it? An international Standard Program Components Current Status Next Steps 2 What is It? A Policy
More informationSmall tech firms. Seizing the benefits of software and systems engineering standards
Small tech firms Seizing the benefits of software systems engineering stards by Claude Y. Laporte, Norm Séguin, Gisele Villas Boas Sanyakorn Buasung The ability of organizations to compete, adapt, survive
More informationHow do I gain confidence in an Inspection Body? Do they need ISO 9001 certification or ISO/IEC 17020 accreditation?
What should I look for when I have an Inspection need? 3 How do I gain confidence in an 4 How can accreditation of the inspection body by an ILAC accreditation body member provide confidence? 6 How can
More informationReviewers of proposed revision to ISO/IEC 19770 1:2006 SAM Processes. Call for feedback on draft of revised 19770 1 Tiered SAM Processes
To: From: Reviewers of proposed revision to ISO/IEC 19770 1:2006 SAM ISO/IEC JTC1 SC7 WG21 Software Date: 30 November 2010 Re: Call for feedback on draft of revised 19770 1 ed SAM On 30 November 2010,
More informationISO/IEC JTC 1/SC 27 N15445
ISO/IEC JTC 1/SC 27 N15445 REPLACES: N14360 ISO/IEC JTC 1/SC 27 Information technology -- Security techniques Secretariat: DIN, Germany DOC TYPE: Business Plan TITLE: SC 27 Business Plan October 2015 September
More informationStatus Report on Storage Security Initiatives
Status Report on Storage Security Initiatives Eric A. Hibbard, CISSP, CISA Sr. Director, Data Networking Technology Hitachi Data Systems Abstract This presentation will review the storage security initiatives
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 29180 First edition 2012-12-01 Information technology Telecommunications and information exchange between systems Security framework for ubiquitous sensor networks Technologies
More informationIS0 1401 1 INTERNATIONAL STANDARD. -Nag. Guidelines for environmental auditing - Audit procedures - Auditing of environmental management systems
INTERNATIONAL STANDARD IS0 101 1 First edition 1996-1 0-01 Guidelines for environmental auditing - Audit procedures - Auditing of environmental management systems Lignes directrices pour /'audit environnemental-
More informationISO/IEC 27001:2013 webinar
ISO/IEC 27001:2013 webinar 11 June 2014 Dr. Mike Nash Gamma Secure Systems Limited UK Head of Delegation, ISO/IEC JTC 1/SC 27 Introducing ISO/IEC 27001:2013 and ISO/IEC 27002:2013 New versions of the Information
More informationISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
More informationInformation technology Security techniques Code of practice for information security controls
INTERNATIONAL STANDARD ISO/IEC 27002 Second edition 2013-10-01 Information technology Security techniques Code of practice for information security controls Technologies de l information Techniques de
More informationInformation Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza
Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank
More informationISO 27001: Information Security and the Road to Certification
ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks
More informationThis is a preview - click here to buy the full publication INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISOIEC 7498-4 First edition 1989-l l-15 Information processing systems - Open Systems Interconnection - Basic Reference Model - Part 4 : Management framework S ys t&mes de traitemen
More informationISO 18308 INTERNATIONAL STANDARD. Health informatics Requirements for an electronic health record architecture
INTERNATIONAL STANDARD ISO 18308 First edition 2011-04-15 Health informatics Requirements for an electronic health record architecture Informatique de santé Exigences relatives à une architecture de l'enregistrement
More informationEDUCORE ISO 20000 Expert Training
EDUCORE ISO 20000 Expert Training Overview ISO/IEC 20000 is the first international standard for IT service management. It was developed in 2005, by ISO/IEC JTC1 SC7 and revised in 2011. ISO/IEC 20000-1:2005
More informationUsing Information Shield publications for ISO/IEC 27001 certification
Using Information Shield publications for ISO/IEC 27001 certification In this paper we discuss the role of information security policies within an information security management program, and how Information
More informationAN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
More informationPart 2: ICT security standards and guidance documents
Part 2: ICT security standards and guidance documents Version 3.0 April, 2007 Introduction The purpose of this part of the Security Standards Roadmap is to provide a summary of existing, approved ICT security
More informationISO 27002:2013 Version Change Summary
Information Shield www.informationshield.com 888.641.0500 sales@informationshield.com Information Security Policies Made Easy ISO 27002:2013 Version Change Summary This table highlights the control category
More informationINTERNATIONAL STANDARD. Guidelines for environmental auditing - General principles
INTERNATIONAL STANDARD IS0 1401 0 First edition 1996-10-01 Guidelines for environmental auditing - General principles Lignes directrices pour I'audit environnemental - Principes generaux - - 7. lima- WNaI
More informationNadya Bartol, CISSP, CGEIT VP, Industry Affairs and Cybersecurity Strategist UTC (Utilities Telecom Council) USA. 2014 Utilities Telecom Council 1
Nadya Bartol, CISSP, CGEIT VP, Industry Affairs and Cybersecurity Strategist UTC (Utilities Telecom Council) USA 2014 Utilities Telecom Council 1 Why do we need cybersecurity? Agriculture and Food Energy
More informationAchieving Effectiveness and Compliance
Achieving Effectiveness and Compliance Paul Palmes Business Standards Architects, Inc. Fargo ND Prescott, WI pcpalmes@cableone.net www.pdcauditing.com 701-371-8224 I-29 Manufacturers Conference Thursday,
More informationISO/IEC/IEEE 29119 The New International Software Testing Standards
ISO/IEC/IEEE 29119 The New International Software Testing Standards Stuart Reid Testing Solutions Group 117 Houndsditch London EC3 UK Tel: 0207 469 1500 Fax: 0207 623 8459 www.testing-solutions.com 1 Stuart
More informationC015 Certification Report
C015 Certification Report NexCode National Security Suite Release 3 File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please
More informationStandardising privacy and security for the cloud
Standardising privacy and security for the cloud Chris Mitchell Royal Holloway, University of London www.chrismitchell.net 1 Acknowledgements Like to thank organisers of event for inviting me to contribute.
More informationInformation Technology Metamodel Framework for Interoperability (MFI) Part 9: On Demand Model Selection
ISO 2011 All rights reserved Reference number of working document: ISO/IEC JTC 1/SC 32/WG 2 N1513 Date: 2011-03-01 Reference number of document: ISO/IEC WD 19763-9 Committee identification: ISO/IEC JTC
More informationEvaluation de la conformité Exigences pour l'audit tierce partie en vue de la certification de systèmes de management
COMMITTEE DRAFT ISO/IEC CD 17021-2 Date 2008-02-11 Supersedes document Reference number CASCO 03/2008 WARNING: This document is not an International Standard. It is distributed for review and comment.
More informationSecurity Control Standard
Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the
More informationManaging e-health data: Security management. Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: mnyssen@vub.ac.
Managing e-health data: Security management Marc Nyssen Medical Informatics VUB Master in Health Telematics KIST E-mail: mnyssen@vub.ac.be Structure of the presentation Data management: need for a clear
More informationCertification for Information System Security Professional (CISSP)
Certification for Information System Security Professional (CISSP) The Art of Service Copyright Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by
More informationLog management and ISO 27001
Log management and ISO 27001 Rakesh Maheshwari STQC Directorate Department of Information Technology Ministry of Communications & IT rakesh@mit.gov.in Log management Log management is the process of generating,
More informationC033 Certification Report
C033 Certification Report Mobile Billing System File name: Version: v1a Date of document: 15 June 2011 Document classification: For general inquiry about us or our services, please email: mycc@cybersecurity.my
More informationSC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards
SC7-ISO20000 Alignment issues Aligning ITIL to existing ISO JTC1- SC7 Software Engineering Standards Dr. A.April ETS University Table of Contents Objectives Audience Current clash An ITIL overview ISO
More information82-03-10 Development and Implementation of Security Standards John P. Hopkinson Payoff
82-03-10 Development and Implementation of Security Standards John P. Hopkinson Payoff This article describes the groups involved in the process of developing standards for information security. The method
More informationThe IAF Multilateral Recognition Arrangement (MLA) Certified Once Accepted Everywhere
The IAF Multilateral Recognition Arrangement (MLA) Certified Once Accepted Everywhere Supporting the acceptance of goods and services across national borders Accreditation provides an assurance to government,
More informationISO/IEC JTC 1 Information technology. Business plan 2014
Information technology Business plan 2014 Our vision To be the world s leading provider of high quality, globally relevant International Standards through its members and stakeholders. Our mission ISO
More informationInformation Security Management Systems
Information Security Management Systems Øivind Høiem CISA, CRISC, ISO27001 Lead Implementer Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector
More informationCloud Security Standards. Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority
Cloud Security Standards Aziza Al Rashdi Director, Cyber Security Professional Services Oman National CERT Information Technology Authority Introduction Sign Off December 2012 Information Technology Authority
More informationSecurity Testing. Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org. F. Scot Anderson, CISSP scot@securixx.comcom. April 7, 2009 V 1.
Standards Based Security Testing Claire L. Lohr, CSQE, CSDP, CTAL clohr@computer.org F. Scot Anderson, CISSP scot@securixx.comcom 1 Topics Why use standards? Secure systems component parts (1st level taxonomy)
More informationISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
More information