IT-Security at Karlsruhe Institute of Technology Introduction. Andreas Lorenz. STEINBUCH CENTRE FOR COMPUTING - SCC
|
|
|
- Austin Davidson
- 10 years ago
- Views:
Transcription
1 IT-Security at Karlsruhe Institute of Technology Introduction Andreas Lorenz STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State of Baden-Württemberg and National Laboratory of the Helmholtz Association
2 Agenda KIT Mission Organization Scientific Topics IT-Security in the Organization IT-Security Policy Cooperation IT-Security, Data Protection and IT- Compliance KIT-CERT Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
3 KIT: One Institution, Two Missions Mission of a state university with research and teaching Mission of a research institution of the Helmholtz Association with program oriented provident research Employees Students 364 Professors Annual Budget in Million Euros 482 Trainees Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
4 KIT: Common Objective Positioning as an institution of excellent research and teaching in natural and engineering sciences on an international scale, with scientific excellence and worldwide top level in Research Teaching Innovation IT-Security and Service Management Prerequisite: Excellent infrastructure and service units Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
5 KIT: Fields, Centers and Focusses 30 Fields of Competence Bundled in 6 Areas of Competence Matter and Materials Earth and Environment Applied Life Siences Systems ans Processes Information, Communication und Organization Technology, Culture and Society KIT Centers: Energy Nano & Micro Science and Technology Elementary Particle and Astroparticle Physics Climate and Environment KIT Focuses: COMMputation Mobility Systems Optics and Photonics Humans and Technology Secure IT-based Solutions! Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
6 SCC: IT-Security in the Organization Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
7 SCC: IT-Security Tasks of ISM Operation and Development IT-Security Management IT-Security Officer Organizational Aspects ASDUR Organizational Aspects Definition of Policies Organizational Aspects Patchmanagement Awareness Operation and Development IT-Security Services KIT-CERT Organizational Aspects KIT-CA Encryption Concept / Operation&Development Platform Intrusion Detection Systems /Intrusion Prevention Systems Security Assesments Desktop Security Andreas Lorenz IT-Security at Karlsruhe Institute of Technology Organisationseinheit, Autor
8 KIT: IT-Security Policy Details low Changes rare IT-Security Guideline (CIO) Common Security Conception (IT-Security Officer) IT-Security Concept IT-Security Policies high Technical Advisories (IT-Security Team) often Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
9 KIT: IT-Security Guideline November 2009 Assets to Protect Organization Presidium / CIO IT-Committees IT-Security Officer Cooperation IT- Security, Data Protection and IT- Compliance SCC and IT-Security Team (KIT-CERT) Users IT-Security Process Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
10 KIT: IT-Security Officer Coordination Definition of IT-Security Concept and Backout Concepts Security-Relevant Projects; Informationflow between persons in charge Initiating and Controlling Actionplan to implement IT-Security Measures IT-Security Awarenesscappaigns- and Trainings Initiating and Coordination Definition of IT-Security Policies Coordination and Controlling IT-Security Process Inspecting Security Incidents Supporting CIO by Definition of IT-Security Guideline Reporting CIO and IT-Security Team Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
11 KIT: ASDUR Arbeitsstab IT-Sicherheit, Datenschutz und IT-Rechtskonformität Cooperation between IT-Security, Data Protection and IT-Compliance at an early stage of a project Lead by CIO Interdisciplinary Key Issues IT-Security Data Protection IT-Compliance Development of Advices Strategic Policies Strategic Regulations Members CIO IT-Security Officer Data Protection Officer Jurisconsult Users Administration Scientists Staff Council Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
12 KIT: IT-Security Process Preparation Strategic Decissions User Interests KIT-Presidium Data Protection ASDUR IV-A (IT-Comitee) IT-Security SCC IT- Compliance Preparation Technical Decission Andreas Lorenz IT-Security at Karlsruhe Institute of Technology, Adrian Wiedemann
13 ASDUR: Task Usergroups Netzzugriff auf das Internet (ab Campus KIT) Netzzugriff auf das Intranet (Netzwerk, kein Inhalt) Inhalte (Web, File,...) VPN / Remote Access KIT (nicht kit.edu) Portalbereich (geschützt) Nutzung Software Lizenzen Rechenleistung Datenhaltung Nutzung von Terminaldiensten (ssh etc.) / Zugriff auf lokale Rechner Business Class Mitarbeiter A1 A6 Mitarbeiter - entbunden A4 A4 A1 A4 A4 A4 A4 A4, A6 A4 A4 A4 Studierende r A1 A6 Gasthörer/S chüler A3 A3 A1 A3 A3 A3 A3, A6 A3 A3 A3 Lehrender A1 A6 Förderer A6 Gast - mitarbeitend A2 A2 A2 A2 A2 A2, A6 A2 A2 A2 Gast A6 Extrener - mitarbeitend A1 A6 Externer A5 Markierung: verboten (rechtlich) mit Auflagen erlaubt erlaubt verboten (KIT- Regelwerk) Rechtliche Unsicherheit Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
14 KIT-CERT Computer Emergency Response Team central authority for issues concerning IT security and coordination in the field of computer abuse in KIT Reactive Services Coordination of security or abuse-related investigations Incident response on imminent security breaches Computer-forensic investigations Proactive Servcies Operating network security systems on various layers Monitoring network traffic for malicious activity Consulting Services Counseling on topics concerning information-security Publishing reports on specific topics for KIT Collaboration regarding the creation and publication of security policies Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
15 KIT-CERT Andreas Lorenz IT-Security at Karlsruhe Institute of Technology
16 Thank you for your attention STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State of Baden-Württemberg and National Laboratory of the Helmholtz Association
Energy research at KIT
Energy research at KIT 25. October 2011 2 nd Workshop of Dr.-Ing. Joachim U. Knebel, Chief Science Officer Bereich 4 KIT University of the State of Baden-Wuerttemberg and National Research Center of the
Steinbuch Centre for Computing (SCC) The Information Technology Centre of KIT
Steinbuch Centre for Computing (SCC) The Information Technology Centre of KIT SCIENTIFIC COMPUTING, HPC AND GRIDS KIT the cooperation of Forschungszentrum Karlsruhe GmbH and Universität Karlsruhe (TH)
IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence
IBM Security Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg
The cloud storage service bwsync&share at KIT
The cloud storage service bwsync&share at KIT Alexander Yasnogor, Nico Schlitter, Andreas Petzold @CERN, Workshop on Cloud Services for File Synchronisation and Sharing STEINBUCH CENTRE FOR COMPUTING -
Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität
Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität Dr. Jens Heider Head of Department Testlab Mobile Security Amt für Wirtschaft und Stadtentwicklung,
SimLabs at KIT, a Strategy for the Future
SimLabs at KIT, a Strategy for the Future [email protected] STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State of Baden-Württemberg and National Research Center of the Helmholtz Association
Network and Security Controls
Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting
Commercial Practices in IA Testing Panel
Commercial Practices in IA Testing Panel March 22, 2001 Albuquerque, New Mexico First Information Assurance Testing Conference Sponsored by: Director, Operational Test and Evaluation Panel Members! Dr.
KIT Site Report. Andreas Petzold. www.kit.edu STEINBUCH CENTRE FOR COMPUTING - SCC
KIT Site Report Andreas Petzold STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State of Baden-Württemberg and National Laboratory of the Helmholtz Association www.kit.edu GridKa Tier 1 - Batch
Solutions for energy efficient buildings and cities
Solutions for energy efficient buildings and cities M.Sc Preslava Krahtova Research associate Institut for Information Management in Engineering (IMI) www.kit.edu Outline Short presentation at KIT Research
Image Data, RDA and Practical Policies
Image Data, RDA and Practical Policies Rainer Stotzka and many others KIT University of the State of Baden-Württemberg and National Laboratory of the Helmholtz Association www.kit.edu Data Life Cycle Lab
INFORMATION SECURITY Humboldt State University
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY Humboldt State University Audit Report 14-50 October 30, 2014 EXECUTIVE SUMMARY OBJECTIVE The objectives of
Cloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay ([email protected])
1 Cloud@Night Event 14. Januar 2016 / Matthias Gessenay ([email protected]) 2 Agenda SharePoint ABC Project Server ABC What s new in O365 4 SharePoint 2016 ABC A Access App-Support
ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014
ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 Legende: gering mittel hoch Änderungsgrad A.5 Information security policies
Safe Harbor Statement
Logging & Debugging von M(obile)AF Applikationen Jürgen Menge Sales Consultant Oracle Deutschland B.V. & Co. KG Safe Harbor Statement The following is intended to outline our general product direction.
Lustre tools for ldiskfs investigation and lightweight I/O statistics
Lustre tools for ldiskfs investigation and lightweight I/O statistics Roland Laifer STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State Roland of Baden-Württemberg Laifer Lustre and tools
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
Additional Security Considerations and Controls for Virtual Private Networks
CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
SOLARIS 10 SECURITY. Technical Overview. Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH
SOLARIS 10 SECURITY Technical Overview Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH Solaris 10 Lizenzen Millions ~ 7M ZFS 7,0 6,5 6,0 5,5 Solaris Container 5,0 4,5 4,0 3,5 3,0
Utica College. Information Security Plan
Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles
The Helmholtz Alliance for Astroparticle Physics
The Helmholtz Alliance for Astroparticle Physics Johannes Blümer Information to ISAPP, October 21, 2011 KIT-Centrum Elementarteilchen- und Astroteilchenphysik KCETA KIT Universität des Landes Baden-Württemberg
Network Security Policy
Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
OPP CITY SCHOOLS JOB DESCRIPTION. (1) Master s degree from an accredited educational institution.
OPP CITY SCHOOLS ASSISTANT PRINCIPAL, ELEMENTARY SCHOOL JOB DESCRIPTION QUALIFICATIONS: (1) Master s degree from an accredited educational institution. (2) Certification in Educational Leadership, School
Cloud Roadmap to Success. October, 2014
Cloud Roadmap to Success October, 2014 Catapult Systems & Level 3 Today s Presenters [email protected] [email protected] What is the Cloud Technology trends: driving cloud adoption
A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS
A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS CYBER ATTACKS INFILTRATE CRITICAL INFRASTRUCTURE SECTORS Government and enterprise critical infrastructure sectors such as energy, communications
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION
INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH
SECURITY REDEFINED Managing risk and securing the business in the age of the third platform Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF
Director Global IT Service Delivery Information Services
Director Global IT Service Delivery Information Services Reporting to: Chief Information Officer Salary: Competitive package Job Family and level: 7 Contract Status: Permanent Hours of Work: Full time
ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems
IBM Global Services ISS X-Force Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems Internet Security Systems, an IBM Company Security Market Overview Companies face sophisticated
A HELPING HAND TO PROTECT YOUR REPUTATION
OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION
Client Security Risk Assessment Questionnaire
Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2
The KOALA Cloud Management Service
The KOALA Cloud Management Service A Modern Approach for Cloud Infrastructure Management CloudCP 1 st International Workshop on Cloud Computing Platforms at EuroSys 2011 Christian Baun, Marcel Kunze April
2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy
2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality
Testen mit Produktionsdaten Fluch oder Segen?
Testen mit Produktionsdaten Fluch oder Segen? Thomas Baumann Die Mobiliar ISACA After Hours Seminar Dienstag, 30.Oktober 2012 2 Agenda PART I: Copy from Production to Test Requirements Solutions and experiences
SIMATIC Remote Services. Industry Services
Industry Services SIMATIC Remote Services Proactive remote support for the SIMATIC automation system optimum support for the efficient operation of your plant siemens.com/siremote Proactive Virus Pattern
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
2015 Global Study on IT Security Spending & Investments
2015 Study on IT Security Spending & Investments Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Sponsored by Part 1. Introduction Security risks are pervasive and becoming
Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI
Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved
INFORMATION SECURITY California Maritime Academy
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:
The STAGEnet Security Model
NDSU 2015 Cyber Security Conference The STAGEnet Security Model Peeling Away the Layers March 17, 2015 NDSU Memorial Union Rose Room NDSU 2015 Cyber Security Conference Art Bakke Enterprise Information
UF IT Risk Assessment Standard
UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Personal Security Practices of the CAO
Personal Security Practices of the CAO 1. Do you forward your government email to your personal email account? 2. When is the last time you changed your Enterprise password? Within the last 60 days Within
Mobile device Management mit NAC
Mobile device Management mit NAC [email protected] 2012 ForeScout Technologies, Page 1 Die NAC Lösung Although approaches such as server-based computing and virtualization will also be used to deal
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Dokument Nr. 521.dw Ausgabe Februar 2013, Rev. 01. . Seite 1 von 11. 521d Seite 1 von 11
Eidgenössisches Departement für Wirtschaft, Bildung und Forschung WBF Staatssekretariat für Wirtschaft SECO Schweizerische Akkreditierungsstelle SAS Checkliste für die harmonisierte Umsetzung der Anforderungen
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
Access control policy: Role-based access
Access control policy: Role-based access As subjects (a person or automated agent) often change roles within an organization, it is best to define an access control policy based on the roles they play.
Managing Information Resources and IT Security
Managing Information Resources and IT Security Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic
Open Access Publishing to Support Geothermal Research
Open Access Publishing to Support Geothermal Research Ernst Huenges, GfZ Potsdam Thomas Kohl, KIT KIT University of the State of Baden-Württemberg and National Large-scale Research Center of the Helmholtz
University of Wisconsin-Madison Policy and Procedure
Page 1 of 14 I. Policy II. A. The, the units of the UW-Madison Health Care Component and each individual or unit within UW-Madison that is a Business Associate of a covered entity (hereafter collectively
Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES
VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES 5.1 MANAGED TIERED SECURITY SERVICES [C.2.7.4, M.2.1.3] Level 3 will support the GSA s Multi-Tier Security Profiles (MTSP) initiative in accordance
CDW Advanced Image Deployment Service Customer Guide
CDW Advanced Image Deployment Service Customer Guide Contents Service Description... 2 Image Deployment Solutions... 2 Why would my organization use this service?... 2 Benefits of Advanced Imaging over
Log Management How to Develop the Right Strategy for Business and Compliance. Log Management
Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps
Self defending networks?
Self defending networks? What we do @ Voith to protect our network. Troopers08, 23.-24.03.08 Munich, Germany Content Author 2 Troopers08 Self Defending Networks 23.04.2008 Global Voith IT Organisation
GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK
GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK German University Alliance (FU Berlin / LMU München) ConRuhr (Dortmund/ Duisburg-Essen / Bochum) Universität Heidelberg RWTH Aachen UAS 7 Hessen Universities
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
Sample Employee Network and Internet Usage and Monitoring Policy
CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
Policy. London School of Economics & Political Science. Application Control. Jethro Perkins Information Security Manager IMT
London School of Economics & Political Science IMT Policy Application Control Jethro Perkins Information Security Manager Summary This document outlines IMT s application control policy, as endorsed by
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011
Junos Pulse Uwe Nelkel Business Development Manager Junos Pulse IBM Golf Cup, Golfclub Holledau, September 14 th 2011 Legal Statement This product roadmap sets forth Juniper Networks current intention
How To Understand And Understand Rwth Aachen University
A short introduction to RWTH Location of RWTH Aachen University RWTH Mainbuilding Development of RWTH Aachen University until 2004 Students Foreign Students Polytechnical School Faculty of Architecture
Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved.
Patch Management Is it recommended to patch an Industrial Automation Control System and, if so, why? Facts Most of the computer components of modern Industrial Automation Control System are based on standard
Smart Data Innovation Lab (SDIL)
Smart Data Innovation Lab (SDIL) Accelerating Data driven Innovation NESSI Summit May 27, 2014 Prof. Dr.-Ing. Michael Beigl Department of Informatics KIT University of the State of Baden-Wuerttemberg and
Citrix Enterprise Mobility more than just device management (MDM)
Citrix Enterprise Mobility more than just device management (MDM) [email protected] Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer
Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security
Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität
JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN For Assignments
NAME: COUNTRY: SPONSOR: DIV/GROUP: PURPOSE: To be filled out by FACTS administrator FACTS Visitor # FACTS Request # JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN
Security Control Standard
Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the
The Oracle Mobile Security Suite: Secure Adoption of BYOD
An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will
Supplier Security Assessment Questionnaire
HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.
