IoD Big Picture Spring 2013

Size: px
Start display at page:

Download "IoD Big Picture Spring 2013"

Transcription

1 IoD Big Picture Spring 2013

2 SNAPSHOT Cyber security is a corporate-level risk that all boards, in both the private and public sectors, need to own directly. The cyber threat applies to all, regardless of size or location. The incidents described in the media are just a snapshot of what is going on. On average, 33,000 malicious s a month are blocked at the gateway to the Government Secure Intranet. The volume of e-crime and attacks on industry continue to be disturbing. Attempts are made to steal British intellectual property (IP) in a range of industries, not just in defence and security. Basic information risk management can stop up to 80% of the cyber attacks seen today, but experience suggests that few organisations get it right. 10 key steps to cyber security are outlined, suggesting a range of controls organisations should consider to protect their most important information, data and IP from cyber attack. Countering the cyber threat to business Recent media reports of high-profile security breaches and industrial-scale corporate espionage have blasted cyber security onto the front pages. No longer simply the preserve of IT departments or even of chief information officers (CIOs), the simultaneous benefits and vulnerabilities inherent in digital networks thrust cyber security onto the board agenda. This is a corporate-level risk which boards across the private and public sector need to own directly. We now take for granted the transformative power of the internet. We have come to expect access on demand any time, any place, anywhere even if three years ago none of us had held an ipad. In the same way that our daily lives are increasingly reliant on cyber technologies, our business processes also hinge upon them. Neglecting the integrity of your systems and their data is an existential threat. I know that the IoD has been conducting research among its members in this area, and the findings make compelling reading. THREAT ASSESSMENT Countering the cyber threat to business Sir Iain Lobban, Director of GCHQ, outlines the scale of the cyber threat facing businesses and outlines 10 key steps to improving organisations online security. So what does the threat look like? I read increasingly well-informed commentary in the media. But GCHQ's cutting-edge technology adds a unique perspective on the issue, illuminating the threats in cyberspace. And I have to say that the incidents I see described in the media are just a snapshot of what is going on. Cyberspace is contested every day, every hour, every minute, every second. From GCHQ s vantage point, we have seen significant disruption to government systems from malware picked up accidentally from the internet but also from deliberate attacks. On average, 33,000 malicious s a month are blocked at the gateway to the Government Secure Intranet they contain sophisticated malware, often sent by highly capable cyber criminals or by state-sponsored groups. And a far greater number of s, comprising less sophisticated malicious s and spam, is blocked each month. That's why cyber security is at the top of my agenda, as we seek to protect the UK s national and economic security.

3 IoD Big Picture Spring 2013 But why should cyber be at the top of your agendas as directors? I can tell you that in the course of our intelligence and security mission, we become aware of theft of intellectual property on a massive scale, compromises of commercial data and disruption of key networks. The volume of e-crime and attacks on industry continue to be disturbing. I can attest to attempts to steal British intellectual property in a range of industries. This is not just an issue for the defence and security sectors; it's much broader. Professional services firms, for example, should be aware that their proprietary client information represents an increasingly attractive target. One of the key problems remains the fact that it may not be immediately obvious to an organisation that it has been targeted. Data can be copied without any sign that it has happened. The risk of not acting now is that, by the time you realise your defences have been breached, it will be too late and the damage will have been done. Directors would not sanction physical premises being left unlocked and the windows left wide open for anyone to walk in and have a nose around. Boards need to apply the same standards to protecting their cyberspace. As technology becomes ever more affordable and available, it is open to a wide range of threat actors states, criminals and hackers to mount attacks which put at risk many millions of pounds of investment on a daily basis. If these attacks are left unchecked, they could have a devastating impact on the future earning potential of companies and the economic well-being of nations. Cyber security is not just an issue for governments it s for companies and citizens too and it goes to the heart of our economic well-being and national interest. The UK economy is built to a significant degree on intellectual capital and services and, to flourish, a knowledge economy needs to maintain the integrity of its data. On a daily basis I see attempts to penetrate systems around the world. The cyber threat applies to us all, regardless of size or location. Many of the systems we are trying to protect extend across national boundaries, but the threat is not limited to multinational organisations. Over half of IoD members organisations export goods or services internationally, but even where a company doesn t have a footprint or partnership overseas, the commercial systems it depends upon will almost certainly have some base in other countries. OPPORTUNITIES AMIDST THE THREATS Incidents described in the media are just a snapshot of what is going on. Cyberspace is contested every second of every day. I m sure the internet will continue to be an engine for growth, commerce and social development a great opportunity for firms in the UK. If the UK is seen to be a safe place to do business, we can attract more inward investment. We also have some cyber security organisations based in the UK which could become world leaders in supplying the cyber security market place. GCHQ has a unique role to play here in the supply and demand. We can support a growing UK cyber security industry. We can showcase the best practice in the public sector, certify firms in the UK as competent at defined government standards and accredit individuals through professional bodies. We can promote product assurance that enables different procurement models in the public sector.

4 Countering the cyber threat to business We want to see cyber security turn into intelligent demand too so that organisations know what to ask for in the cyber security market place. We aim to help boards see protection against cyber attack as a critical investment, not an overhead. Working in partnership with the Cabinet Office, the Department for Business, Innovation and Skills and the Centre for the Protection of National Infrastructure, GCHQ has therefore developed best practice guidance to help the private sector safeguard valuable assets, such as personal data, online services and intellectual property, from cyber attack. The pages which follow summarise the key stages to better cyber security. Don't gamble with your business's future. So much can be done to strengthen defences through a series of rigorous steps to understand what you ve got to lose and what it is worth. There may be some way still to go in raising awareness of the cyber threat and ensuring good security practice is sufficiently embedded, but more and more directors recognise the challenges and opportunities. Cyber security is a risk that boards should be treating as a critical agenda item. The threat is real and growing. Be a hard target. 10 STEPS TO CYBER SECURITY The responsibility to manage your organisation s cyber risks starts and stops at board level. Basic information risk management can stop up to 80% of the cyber attacks seen today. However, experience suggests that few organisations get this right. Ask yourselves the following key questions: Have you identified your organisation s key information assets and the impact it would have on your organisation if they were compromised or your online services were disrupted? Have you clearly identified the key threats to your organisation s information assets and set an appetite for the associated risks? Are you confident that your organisation s most important information is being properly managed and is safe from cyber threats? GCHQ is aware of theft of IP on a massive scale. The volume of attacks on industry continues to be disturbing. If the answer to any of those questions is no or don t know, read on. The degree to which each of the 10 steps detailed below is relevant to a particular business or organisation will inevitably vary. So will the degree of implementation that may be required: some suggested measures will only be feasible or appropriate for large organisations with dedicated security resources and teams. But it is likely that there will be elements of every step that are pertinent to all organisations, regardless of size, and all directors reading this article are strongly encouraged to review their organisation s security procedures in light of the guidance. Collectively, the recommended actions represent a good foundation for effective information risk management. It is about getting the basics right taking them will make a tangible difference to your vulnerability to cyber attack.

5 IoD Big Picture Spring 2013 BOX 1: Information Risk Management Regime The following security controls should be considered: Establish a governance framework that enables and supports information risk management across the organisation, with ultimate responsibility for risk ownership residing at board level. Determine the organisation s risk appetite, as for any other risk. Agree the level of information risk the organisation is prepared to tolerate in pursuit of its business objectives and communicate it. Maintain the board s engagement with information risk by making the risks to information assets from a cyber attack a regular board agenda item. Produce supporting policies. The board should create and own an overarching information risk policy, setting out the information risk management strategy for the organisation as a whole. Adopt a lifecycle approach to information risk management to ensure security controls remain appropriate as the components of risks change over time. Apply recognised standards of security management good practice, and implement physical, personnel, procedural and technical measures. Educate users and maintain their awareness as all users have a responsibility to manage the risks to ICT and information assets. Provide appropriate training and refresh it regularly. Promote a risk management culture that is organisation-wide, driven by corporate governance from the top down. Step 1: Information Risk Management Regime Risk is an inherent part of doing business, and must be managed proportionately and appropriately. Organisations should apply the same degree of rigour to assessing the risks to their information assets as they would to legal, regulatory, financial or operational risks. An information risk management regime should be embedded across the organisation, actively supported by the board and senior managers, and communicated broadly. A lack of effective information risk management and governance may lead to any of the following: Increased exposure to risk: without effective risk governance processes it is impossible for the board to understand the risk exposure of the organisation. Missed business opportunities: whilst an overly open approach to information risk may expose the organisation to unacceptable risks, an overly cautious approach may lead to missed business opportunities. Ineffective policy implementation: without effective risk management and governance processes, the board will not have confidence that its stated policy is being implemented. Box 1 sets out the recommended actions to mitigate the risks.

6 Countering the cyber threat to business BOX 2: Secure Configuration The following security controls should be considered: Develop policies to update and patch systems, such as using the latest versions of operating systems, browsers and applications, and using automated patch management and software update tools. Create and maintain hardware and software inventories, to identify any unauthorised hardware or software. Use automated tools to create and maintain inventories of every device and application used by the organisation. Lock down operating systems and software by creating a baseline security build for workstations, servers, firewalls and routers. Remove or disable any services, functionality or applications not required by the business. Conduct regular vulnerability scans by using automated scanning tools against all networked devices at least weekly, and remedy any vulnerability within an agreed time frame. Disable unnecessary input/output devices and removable media access, assessing business requirements for user access to devices such as MP3 players and smart phones, and disabling functionality that is not needed (e.g. USB ports, floppy/cd/dvd/card media drives). Implement white-listing and execution control, maintaining a list of authorised applications and preventing the installation of unauthorised software and applications. Limit user ability to change configuration by providing users with the minimum system rights and permissions needed to fulfil their role. Step 2: Secure Configuration Establishing and actively maintaining the secure configuration of ICT systems is a key security control. By putting in place policies and processes to develop secure baseline builds and manage the ongoing functionality of all ICT systems, organisations can greatly improve their security. Unnecessary functionality should be removed or disabled, and ICT systems should be patched against known vulnerabilities. ICT systems that are not locked down, hardened or patched will be particularly vulnerable to an easily preventable attack. Risks include: Unauthorised changes to systems: an attacker could make unauthorised changes to ICT systems or information, compromising confidentiality, availability and integrity. Exploitation of unpatched vulnerabilities: attackers (using malware) will attempt to exploit unpatched systems; many successful attacks are enabled by exploiting a vulnerability for which a patch had been issued some months previously. Exploitation of insecure system configurations: an attacker could exploit a system that has not been locked down or hardened to compromise systems and information. Increases in the number of security incidents: caused by an organisation s lack of awareness of its vulnerabilities and the availability (or not) of patches and fixes. Box 2 sets out the recommended actions to mitigate the risks.

7 IoD Big Picture Spring 2013 BOX 3: Network Security The following security controls should be considered: Police the network perimeter, inspecting all traffic at the perimeter and limiting access to network ports. Install firewalls to form a buffer zone against the untrusted external network. Prevent malicious content by deploying anti-virus and malware checking solutions to examine inbound and outbound data at the network perimeter, as well as anti-virus and malware protection deployed on internal networks. Protect the internal network by preventing direct connections between internal systems and untrusted external networks. Segregate network assets, identifying, grouping and isolating critical business information assets. Secure wireless devices by only allowing them to connect to trusted wireless networks. Protect internal IP addresses to prevent them being exposed to external networks. Monitor the network using intrusion monitoring tools and regularly audit activity logs. Test the security controls by conducting regular penetration tests and undertaking simulated cyber attack exercises. Step 3: Network Security Organisations can prevent attacks designed to compromise their ICT systems and the information stored by them by developing appropriate approaches to risk management and by applying commensurate security controls. Your organisation s networks need to be protected against both internal and external threats, with the degree of protection governed by the organisation s risk appetite and security policies. Those that fail to protect their networks are subject to a number of risks: Leakage of sensitive information: poor network design could be exploited by both internal and external attackers, leading to the loss of sensitive information and compromises in confidentiality and integrity. Import and export of malware: failing to erect appropriate boundary security controls could result in the compromise of business systems and the accidental release of malware to business partners. Denial of service: networks connected to untrusted networks (such as the internet) are vulnerable to denial of services attacks. Damage or defacement: attackers that successfully compromise the network can damage internal and externally facing systems, such as defacing websites. Box 3 sets out the recommended actions to mitigate the risks.

8 Countering the cyber threat to business BOX 4: Managing User Privileges The following security controls should be considered: Establish effective account management processes, managing and reviewing user accounts from creation and modification to eventual deletion when a member of staff leaves. Unused or dormant accounts e.g. for temporary staff should be removed. Limit the number and use of privileged accounts, as well as minimising privileges for all users and providing administrators with normal accounts for business use. Monitor all users, with particular monitoring of access to sensitive information and the use of privileged account actions, such as the creation of new accounts, changes to passwords or the deletion of accounts and audit logs. Establish policies and standards for user identification and access control, including for the quality and lifecycle of passwords. These should ideally be machine-generated and randomised. Set up a personnel screening process, with all users undergoing preemployment screening to a level commensurate with their access to sensitive information. Limit access to the audit system and the system activity logs to preserve the integrity of the content. Educate users and maintain their awareness without exception, all users should be aware of the organisation s policies regarding acceptable account usage and their responsibility to adhere to security policies. Step 4: Managing User Privileges It is good practice for organisations to manage the access privileges users have to ICT systems and the information held. All users should only be provided with the privileges they need to do their job: the principle often referred to as Least Privilege. A failure to manage user privileges appropriately may result in an increase in the number of deliberate and accidental attacks: Misuse of privileges: ICT systems can be deliberately or accidentally damaged by authorised users misusing their privileges, leading to a loss of the confidentiality, integrity or availability of the system or information held. Increased attacker capability: attackers using a compromised user account will, if allowed, return and reuse it on numerous occasions, or sell the access to others. They will particularly seek to gain access to root or administrative accounts. Negating established security controls: where attackers have privileged access they can make changes to security controls or delete audit logs to attempt to cover their tracks. Box 4 sets out the recommended actions to mitigate the risks.

9 IoD Big Picture Spring 2013 BOX 5: User Education and Awareness The following security controls should be considered: Produce a user security policy as part of the organisation s overarching security policy, covering acceptable use of ICT. Establish a staff induction process, ensuring that new users (including contractors and third party users) are aware of their personal responsibility to comply with the organisation s security policies. Maintain user awareness of the cyber risks faced by the organisation, for example via regular refresher training. Support the formal assessment of Information Assurance skills, encouraging staff in security roles to develop and formally validate their skills. Carry out pre-employment screening and background security checks commensurate with the individual s role and access to sensitive information. Monitor the effectiveness of security training through formal feedback. Promote an incident reporting culture to encourage staff to voice their concerns. Establish a formal disciplinary process, making staff aware that any abuse of security policy will result in disciplinary action. Step 5: User Education and Awareness Employees use of ICT brings risks, so it is critical for all staff to be aware of their personal security responsibilities. Security training and awareness can increase levels of expertise and knowledge, and foster a securityconscious culture. Organisations without user security policies, or that do not train users in good security practices, will be vulnerable to many of the following risks: Unacceptable use: without a clear policy users may compromise sensitive commercial information, resulting in legal or regulatory sanction or reputational damage. Removable media and personal devices: unless clearly communicated otherwise, staff may use their own removable media or connect their personal device to the organisation s infrastructure. This could lead to the import of malware. Incident reporting: the impact of any incident could be compounded if users do not report incidents promptly. Security operating procedures: users not trained in the secure use of the organisation s ICT systems may accidentally misuse them. External attack: users remain the weakest link in the security chain and will always be a primary focus for a range of attacks. A successful attack may only require one user to open an with malicious content. Box 5 sets out the recommended actions to mitigate the risks.

10 Countering the cyber threat to business BOX 6: Incident Management An organisation s business profile will determine the type and nature of incidents that may occur. A risk-based approach considering all business processes should therefore be used to shape incident management plans: Obtain senior management approval and backing the board must understand the risks and benefits of incident management, resource it appropriately, and lead delivery. Establish an incident response and disaster recovery capability by developing and maintaining incident management plans with clear roles and responsibilities, testing them regularly. Provide specialist training to the incident response team. Define the required roles and responsibilities of those who will handle ICT incidents. Establish a data recovery capability and a systematic approach to the backup of corporate information. The ability to recover archived data should be tested. Test the incident management plans regularly. Collect and analyse post-incident evidence to identify and remedy the root cause. Conduct a lessons learned review by logging the actions taken during an incident and reviewing performance. Step 6: Incident Management Security incidents are inevitable and will range in their business impact. All organisations will experience an information security incident at some point. However, establishing effective incident management policies and processes will help to improve resilience, support business continuity, improve customer and stakeholder confidence and reduce any financial impact. Organisations failing to implement effective capabilities risk the following: A major disruption of business operations: failure to realise an incident has occurred, and to manage it effectively, may compound its impact. Continual business disruption: organisations failing to address the root cause of incidents could be exposed to consistent and damaging business disruption. Failure to comply with legal and regulatory reporting requirements: incidents resulting in the compromise of sensitive information covered by mandatory reporting controls not adhered to could lead to legal or regulatory penalties. Box 6 sets out the recommended actions to mitigate the risks.

11 IoD Big Picture Spring 2013 BOX 7: Malware Prevention Develop and publish corporate policies covering the acceptable and secure use of the organisation s systems, addressing the business processes vulnerable to malware. Establish anti-malware defences across the organisation, agreeing an approach to managing the risks from malware for each business area. Scan for malware across the organisation, protecting all host and client machines with anti-virus solutions that actively scan for malware. Manage all data import and export, scanning all information supplied to or from the organisation for malicious content. Blacklist malicious websites, ensuring that the perimeter gateway blocks access. Establish malware defences based on multiple defensive layers. The following controls are considered essential to manage the risks from malware: Deploy anti-virus and malicious code checking solutions to scan objects at the perimeter, on internal networks and on host systems. Deploy content filtering capability on all external gateways to stop attackers delivering malicious code to the common desktop applications used by the user. Install firewalls on the host and gateway devices. If possible, disable Windows scripting, Active X, VBScript and JavaScript, and disable the auto run function on removable media. Regularly scan every network component and apply security patches. Apply the secure baseline build to every network device and mobile platform. User education and awareness establish clear operating procedures for corporate desktops. Step 7: Malware Prevention Any information exchange risks exposure to malicious code and content (malware) which could seriously damage the confidentiality, integrity and availability of an organisation s ICT. Malware infections can result in disruption to business services, unauthorised exports of sensitive information and financial loss. Opportunities for the import of malware include: still the primary path for internal and external information exchange. Can be used for targeted or random attacks (phishing) through file attachments that release their payload when the file is opened, or redirect to websites with malicious content. Web browsing and access to social media: uncontrolled, can provide opportunities for an attacker to direct malicious content to an individual user or lead to the download of content from a compromised or malicious website. Removable media and personal devices: malware can be transferred to an organisation s ICT system through the use of unapproved media or the initial connection of a personal device. Box 7 sets out the recommended actions to mitigate the risks.

12 Countering the cyber threat to business BOX 8: Monitoring Countering the cyber threat to business 87 Establish a monitoring strategy and policy based on an assessment of the risks and taking into account previous security incidents and attacks. Monitor all ICT systems, ensuring that all networks and host systems (e.g. clients and servers) are monitored, potentially through the use of Network and Host Intrusion Detection Systems (NIDS/HIDS) and Prevention Solutions. Monitor network traffic continuously to identify unusual activity or trends that could indicate an attack or compromise of data. Monitor all user activity, generating audit logs able to identify the user, the activity that prompted the alert and the information they were trying to access. Fine-tune monitoring systems so that they only collect relevant logs, events and alerts. Inappropriate collection of monitoring information could be costly, breach data protection and privacy legislation, and hinder the detection of real attacks. Ensure there is sufficient storage, as monitoring can generate vast quantities of data. Train the security personnel on the deployment of monitoring capability and the analysis of security alerts, events and accounting logs. Align the incident management policies so that processes are in place to respond to incidents detected by monitoring. Ensure that monitoring capabilities are tested and that lessons from security incidents are learned. Step 8: Monitoring Monitoring ICT activity allows organisations to detect attacks and react to them appropriately, whilst providing a basis upon which lessons can be learned to improve the overall security of the business. Without the ability to monitor effectively, organisations will not be able to: Detect attacks: either those originating from outside the organisation or attacks as a result of deliberate or accidental insider activity. React to attacks: so that an appropriate response can be taken to prevent or minimise the resultant impact of an attack. Account for activity: the organisation will have an incomplete understanding of how its ICT systems or information are being used. Box 8 sets out the recommended actions to mitigate the risks.

13 IoD Big Picture Spring 2013 BOX 9: Removable Media Controls Produce a corporate policy to control the use of removable media for the import and export of information. Limit the use of removable media where use is unavoidable, organisations should limit the types of media that can be used, together with the users, systems and types of information that can be stored or transferred on removable media. Scan all removable media for malware with anti-virus solutions. Any media brought into the organisation should be scanned for malware by a stand alone scanner before any data transfer takes place. Audit media regularly so that individuals are accountable for its secure use. Encrypt the information held on the media, using encryption proportionate to the value of the information and the risks posed to it. Lock down access to media drives by default and only allow access to approved, authorised devices. Monitor systems to detect and react to the unauthorised use of removable media. Actively manage the reuse and disposal of removable media to ensure previously stored information will not be accessible. Step 9: Removable Media Controls Using removable media to store or transfer significant amounts of personal and commercially sensitive information is an everyday business process. It is good practice to carry out a risk/benefit analysis of the use of removable media and to apply appropriate and proportionate security. Those failing to control and manage the import and export of information using removable media could face the following risks: Loss of information: the physical design of removable media can result in it being misplaced or stolen, potentially compromising the information stored on it. Introduction of malware: uncontrolled use of removable media will increase the risk from malware if the media can be used on multiple ICT systems. Information leakage: some types of media retain information after user deletion, which could lead to an unauthorised transfer of information between systems. Reputational damage: a loss of sensitive data can attract media attention and erode customer confidence. Financial loss: the loss or compromise of sensitive information could subject the organisation to financial penalties. Removable media should only be used to store or transfer information as a last resort. Risks may be reduced by taking the steps outlined in Box 9.

14 Countering the cyber threat to business BOX 10: Home and Mobile Working Assess the risks and create a mobile working policy that determines aspects such as the process for authorising off-site working, the type of information that can be stored on devices, encryption and incident reporting. Educate users and maintain their awareness to ensure all users are capable of operating mobile devices securely. Protect data at rest by minimising the amount of data stored on a mobile device to that which is needed to fulfil the business activity being delivered off-site. Encrypt data. Protect data in transit if users are working remotely the connection back to the corporate network will probably use an untrusted public network such as the internet. The device and the information exchange should be protected by an appropriately configured Virtual Private Network (VPN). Review incident management plans. Mobile working attracts significant risks; security incidents will occur even when users follow the security procedures. Plans should be sufficiently flexible to deal with a range of incidents. Ideally, technical processes should be in place to disable a lost device remotely and deny it access to the main network. Step 10: Home and Mobile Working Mobile working offers great business benefits but, in extending the security boundary to the user s location, also presents risks that will be challenging to manage. Organisations should establish risk-based policies to cover all types of mobile devices and flexible working, and plan for an increase in the number of security incidents. Mobile working entails the transit and storage of information outside the organisation s secure infrastructure, perhaps to devices with more limited security features or the use of devices in public places. The following risks could be realised: Loss or theft of the device: mobile devices are attractive and valuable, and often used in open view. There are therefore highly vulnerable to being stolen. Being overlooked: some users will have to work in public open spaces where they are vulnerable to being observed. Loss of credentials: if usernames and passwords are stored with a device used for remote working, and it is lost or stolen, the attacker could compromise the organisation s ICT systems. Tampering: attackers may target mobile devices left unattended and insert malicious software or hardware, allowing them to monitor all user activity. Box 10 sets out the recommended actions to mitigate the risks.

15 IoD Big Picture Spring 2013 NEXT STEPS The technical level of cyber attacks is growing exponentially. What was considered a sophisticated cyber attack only a year ago might now be incorporated into a downloadable and easy to deploy internet application, requiring little or no expertise to use. You can never be totally safe from cyber threats. Risks will, at times, become reality. However, this article has identified some practical steps which you, as leaders, can take to improve the protection of your networks and the information carried on them. Don t let cyber security become the agenda put it on the agenda. Further resources The full set of GCHQ s Cyber Security Guidance for Business documents is available on the GCHQ website: The Centre for the Protection of National Infrastructure s Top 20 Critical Controls for Effective Cyber Defence provides additional information on a range of quick wins through advanced technical measures:

16 Countering the cyber threat to business

Reducing the Cyber Risk in 10 Critical Areas

Reducing the Cyber Risk in 10 Critical Areas Reducing the Cyber Risk in 10 Critical Areas Information Risk Management Regime Establish a governance framework Enable and support risk management across the organisation. Determine your risk appetite

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Top tips for improved network security

Top tips for improved network security Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a

More information

How to Practice Safely in an era of Cybercrime and Privacy Fears

How to Practice Safely in an era of Cybercrime and Privacy Fears How to Practice Safely in an era of Cybercrime and Privacy Fears Christina Harbridge INFORMATION PROTECTION SPECIALIST Information Security The practice of defending information from unauthorised access,

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

The Cancer Running Through IT Cybercrime and Information Security

The Cancer Running Through IT Cybercrime and Information Security WHITE PAPER The Cancer Running Through IT Prepared by: Richard Brown, Senior Service Management Consultant Steve Ingall, Head of Consultancy 60 Lombard Street London EC3V 9EA T: +44 (0)207 464 8883 E:

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

Connect Smart for Business SME TOOLKIT

Connect Smart for Business SME TOOLKIT Protect yourself online Connect Smart for Business SME TOOLKIT WELCOME To the Connect Smart for Business: SME Toolkit The innovation of small and medium sized enterprises (SMEs) is a major factor in New

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

developing your potential Cyber Security Training

developing your potential Cyber Security Training developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Seven Things To Consider When Evaluating Privileged Account Security Solutions Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Security Management. Keeping the IT Security Administrator Busy

Security Management. Keeping the IT Security Administrator Busy Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions Managed Security Managed Security MANAGED SECURITY SOLUTIONS I would highly recommend for your company s network review... were by far the best company IT Manager, Credit Management Agency Presenting IT

More information

March 2012 www.tufin.com

March 2012 www.tufin.com SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...

More information

Cyber Security Issues - Brief Business Report

Cyber Security Issues - Brief Business Report Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices

TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security

More information

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Driving Company Security is Challenging. Centralized Management Makes it Simple. Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary

More information

KEY STEPS FOLLOWING A DATA BREACH

KEY STEPS FOLLOWING A DATA BREACH KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,

More information

U06 IT Infrastructure Policy

U06 IT Infrastructure Policy Dartmoor National Park Authority U06 IT Infrastructure Policy June 2010 This document is copyright to Dartmoor National Park Authority and should not be used or adapted for any purpose without the agreement

More information

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits

Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits HIPAA Security Rule & Live Hack Tod Ferran, CISSP, QSA Intro Tod Ferran, CISSP, QSA 25 years working with IT and physical security 2 years PCI and HIPAA security consulting, performing entity compliance

More information

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India CIRCULAR CIR/MRD/DP/13/2015 July 06, 2015 To, All Stock Exchanges, Clearing Corporation and Depositories. Dear Sir / Madam, Subject: Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending Against Data Beaches: Internal Controls for Cybersecurity Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity

More information

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES

AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES AUSTRALIAN GOVERNMENT INFORMATION MANAGEMENT OFFICE CYBER SECURITY CAPABILITY FRAMEWORK & MAPPING OF ISM ROLES Final Report Prepared by Dr Janet Tweedie & Dr Julie West June 2010 Produced for AGIMO by

More information

Section 12 MUST BE COMPLETED BY: 4/22

Section 12 MUST BE COMPLETED BY: 4/22 Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Working Practices for Protecting Electronic Information

Working Practices for Protecting Electronic Information Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that

More information

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness CISP BULLETIN Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness November 21, 2006 To support compliance with the Cardholder Information Security Program (CISP), Visa USA

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Payment Card Industry Data Security Standard

Payment Card Industry Data Security Standard Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Data Protection Act 1998. Bring your own device (BYOD)

Data Protection Act 1998. Bring your own device (BYOD) Data Protection Act 1998 Bring your own device (BYOD) Contents Introduction... 3 Overview... 3 What the DPA says... 3 What is BYOD?... 4 What are the risks?... 4 What are the benefits?... 5 What to consider?...

More information

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2 Texas Wesleyan Firewall Policy Purpose... 1 Scope... 1 Specific Requirements... 1 PURPOSE Firewalls are an essential component of the Texas Wesleyan information systems security infrastructure. Firewalls

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY

Appendix 1c. DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY Appendix 1c DIRECTORATE OF AUDIT, RISK AND ASSURANCE Internal Audit Service to the GLA REVIEW OF NETWORK/INTERNET SECURITY DISTRIBUTION LIST Audit Team Prakash Gohil, Audit Manager Steven Snaith, Risk

More information

Information Services. The University of Kent Information Technology Security Policy

Information Services. The University of Kent Information Technology Security Policy Information Services The University of Kent Information Technology Security Policy 1. General The University IT Security Policy (the Policy) shall be approved by the Information Services Committee (ISC)

More information

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities

More information

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS

STRATEGIC POLICY REQUIRED HARDWARE, SOFTWARE AND CONFIGURATION STANDARDS Policy: Title: Status: ISP-S9 Use of Computers Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1. Introduction 1.1. This information security policy document contains high-level

More information

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose...

IM&T Infrastructure Security Policy. Document author Assured by Review cycle. 1. Introduction...3. 2. Policy Statement...3. 3. Purpose... IM&T Infrastructure Security Policy Board library reference Document author Assured by Review cycle P070 Information Security and Technical Assurance Manager Finance and Planning Committee 3 Years This

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

Security Overview. BlackBerry Corporate Infrastructure

Security Overview. BlackBerry Corporate Infrastructure Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security

More information

Rotherham CCG Network Security Policy V2.0

Rotherham CCG Network Security Policy V2.0 Title: Rotherham CCG Network Security Policy V2.0 Reference No: Owner: Author: Andrew Clayton - Head of IT Robin Carlisle Deputy - Chief Officer D Stowe ICT Security Manager First Issued On: 17 th October

More information

06100 POLICY SECURITY AND INFORMATION ASSURANCE

06100 POLICY SECURITY AND INFORMATION ASSURANCE Version: 5.4 Last Updated: 30/01/14 Review Date: 27/01/17 ECHR Potential Equality Impact Assessment: Low Management of Police Information (MoPI) The Hampshire Constabulary recognises that any information

More information

Guide to Vulnerability Management for Small Companies

Guide to Vulnerability Management for Small Companies University of Illinois at Urbana-Champaign BADM 557 Enterprise IT Governance Guide to Vulnerability Management for Small Companies Andrew Tan Table of Contents Table of Contents... 1 Abstract... 2 1. Introduction...

More information

Information Security It s Everyone s Responsibility

Information Security It s Everyone s Responsibility Information Security It s Everyone s Responsibility The University of Texas at Dallas Information Security Office (ISO) Purpose of Training Information generated, used, and/or owned by UTD has value. Because

More information

Course: Information Security Management in e-governance

Course: Information Security Management in e-governance Course: Information Security Management in e-governance Day 2 Session 2: Security in end user environment Agenda Introduction to IT Infrastructure elements in end user environment Information security

More information

Hands on, field experiences with BYOD. BYOD Seminar

Hands on, field experiences with BYOD. BYOD Seminar Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen tschiltmans@deloitte.nl

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Cisco Advanced Services for Network Security

Cisco Advanced Services for Network Security Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs

More information

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

NERC CIP VERSION 5 COMPLIANCE

NERC CIP VERSION 5 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining

More information

Music Recording Studio Security Program Security Assessment Version 1.1

Music Recording Studio Security Program Security Assessment Version 1.1 Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015 Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating

More information

Information Security: Business Assurance Guidelines

Information Security: Business Assurance Guidelines Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Additional Security Considerations and Controls for Virtual Private Networks

Additional Security Considerations and Controls for Virtual Private Networks CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES

More information

What Do You Mean My Cloud Data Isn t Secure?

What Do You Mean My Cloud Data Isn t Secure? Kaseya White Paper What Do You Mean My Cloud Data Isn t Secure? Understanding Your Level of Data Protection www.kaseya.com As today s businesses transition more critical applications to the cloud, there

More information

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER Molex Premise Networks EXECUTIVE SUMMARY This article discusses IT security, which is a well documented and widely discussed issue. However, despite the

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure

More information

Information Security Policy

Information Security Policy Information Security Policy Last updated By A. Whillance/ Q. North/ T. Hanson On April 2015 This document and other Information Services documents are held online on our website: https://staff.brighton.ac.uk/is

More information

University of Kent Information Services Information Technology Security Policy

University of Kent Information Services Information Technology Security Policy University of Kent Information Services Information Technology Security Policy IS/07-08/104 (A) 1. General The University IT Security Policy (the Policy) shall be approved by the Information Systems Committee

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY

ICT OPERATING SYSTEM SECURITY CONTROLS POLICY ICT OPERATING SYSTEM SECURITY CONTROLS POLICY TABLE OF CONTENTS 1. INTRODUCTION... 3 2. LEGISLATIVE FRAMEWORK... 3 3. OBJECTIVE OF THE POLICY... 4 4. AIM OF THE POLICY... 4 5. SCOPE... 4 6. BREACH OF POLICY...

More information

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management. www.kaseya.com Kaseya White Paper Endpoint Security Fighting Cyber Crime with Automated, Centralized Management www.kaseya.com To win the ongoing war against hackers and cyber criminals, IT professionals must do two

More information

Best Practices for PCI DSS V3.0 Network Security Compliance

Best Practices for PCI DSS V3.0 Network Security Compliance Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

CYBER SECURITY Audit, Test & Compliance

CYBER SECURITY Audit, Test & Compliance www.thalescyberassurance.com CYBER SECURITY Audit, Test & Compliance 02 The Threat 03 About Thales 03 Our Approach 04 Cyber Consulting 05 Vulnerability Assessment 06 Penetration Testing 07 Holistic Audit

More information