IT-Security at Karlsruhe Institute of Technology Introduction. Andreas Lorenz. STEINBUCH CENTRE FOR COMPUTING - SCC

Size: px
Start display at page:

Download "IT-Security at Karlsruhe Institute of Technology Introduction. Andreas Lorenz. www.kit.edu STEINBUCH CENTRE FOR COMPUTING - SCC"

Transcription

1 IT-Security at Karlsruhe Institute of Technology Introduction Andreas Lorenz STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State of Baden-Württemberg and National Laboratory of the Helmholtz Association

2 Agenda KIT Mission Organization Scientific Topics IT-Security in the Organization IT-Security Policy Cooperation IT-Security, Data Protection and IT- Compliance KIT-CERT Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

3 KIT: One Institution, Two Missions Mission of a state university with research and teaching Mission of a research institution of the Helmholtz Association with program oriented provident research Employees Students 364 Professors Annual Budget in Million Euros 482 Trainees Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

4 KIT: Common Objective Positioning as an institution of excellent research and teaching in natural and engineering sciences on an international scale, with scientific excellence and worldwide top level in Research Teaching Innovation IT-Security and Service Management Prerequisite: Excellent infrastructure and service units Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

5 KIT: Fields, Centers and Focusses 30 Fields of Competence Bundled in 6 Areas of Competence Matter and Materials Earth and Environment Applied Life Siences Systems ans Processes Information, Communication und Organization Technology, Culture and Society KIT Centers: Energy Nano & Micro Science and Technology Elementary Particle and Astroparticle Physics Climate and Environment KIT Focuses: COMMputation Mobility Systems Optics and Photonics Humans and Technology Secure IT-based Solutions! Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

6 SCC: IT-Security in the Organization Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

7 SCC: IT-Security Tasks of ISM Operation and Development IT-Security Management IT-Security Officer Organizational Aspects ASDUR Organizational Aspects Definition of Policies Organizational Aspects Patchmanagement Awareness Operation and Development IT-Security Services KIT-CERT Organizational Aspects KIT-CA Encryption Concept / Operation&Development Platform Intrusion Detection Systems /Intrusion Prevention Systems Security Assesments Desktop Security Andreas Lorenz IT-Security at Karlsruhe Institute of Technology Organisationseinheit, Autor

8 KIT: IT-Security Policy Details low Changes rare IT-Security Guideline (CIO) Common Security Conception (IT-Security Officer) IT-Security Concept IT-Security Policies high Technical Advisories (IT-Security Team) often Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

9 KIT: IT-Security Guideline November 2009 Assets to Protect Organization Presidium / CIO IT-Committees IT-Security Officer Cooperation IT- Security, Data Protection and IT- Compliance SCC and IT-Security Team (KIT-CERT) Users IT-Security Process Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

10 KIT: IT-Security Officer Coordination Definition of IT-Security Concept and Backout Concepts Security-Relevant Projects; Informationflow between persons in charge Initiating and Controlling Actionplan to implement IT-Security Measures IT-Security Awarenesscappaigns- and Trainings Initiating and Coordination Definition of IT-Security Policies Coordination and Controlling IT-Security Process Inspecting Security Incidents Supporting CIO by Definition of IT-Security Guideline Reporting CIO and IT-Security Team Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

11 KIT: ASDUR Arbeitsstab IT-Sicherheit, Datenschutz und IT-Rechtskonformität Cooperation between IT-Security, Data Protection and IT-Compliance at an early stage of a project Lead by CIO Interdisciplinary Key Issues IT-Security Data Protection IT-Compliance Development of Advices Strategic Policies Strategic Regulations Members CIO IT-Security Officer Data Protection Officer Jurisconsult Users Administration Scientists Staff Council Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

12 KIT: IT-Security Process Preparation Strategic Decissions User Interests KIT-Presidium Data Protection ASDUR IV-A (IT-Comitee) IT-Security SCC IT- Compliance Preparation Technical Decission Andreas Lorenz IT-Security at Karlsruhe Institute of Technology, Adrian Wiedemann

13 ASDUR: Task Usergroups Netzzugriff auf das Internet (ab Campus KIT) Netzzugriff auf das Intranet (Netzwerk, kein Inhalt) Inhalte (Web, File,...) VPN / Remote Access KIT (nicht kit.edu) Portalbereich (geschützt) Nutzung Software Lizenzen Rechenleistung Datenhaltung Nutzung von Terminaldiensten (ssh etc.) / Zugriff auf lokale Rechner Business Class Mitarbeiter A1 A6 Mitarbeiter - entbunden A4 A4 A1 A4 A4 A4 A4 A4, A6 A4 A4 A4 Studierende r A1 A6 Gasthörer/S chüler A3 A3 A1 A3 A3 A3 A3, A6 A3 A3 A3 Lehrender A1 A6 Förderer A6 Gast - mitarbeitend A2 A2 A2 A2 A2 A2, A6 A2 A2 A2 Gast A6 Extrener - mitarbeitend A1 A6 Externer A5 Markierung: verboten (rechtlich) mit Auflagen erlaubt erlaubt verboten (KIT- Regelwerk) Rechtliche Unsicherheit Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

14 KIT-CERT Computer Emergency Response Team central authority for issues concerning IT security and coordination in the field of computer abuse in KIT Reactive Services Coordination of security or abuse-related investigations Incident response on imminent security breaches Computer-forensic investigations Proactive Servcies Operating network security systems on various layers Monitoring network traffic for malicious activity Consulting Services Counseling on topics concerning information-security Publishing reports on specific topics for KIT Collaboration regarding the creation and publication of security policies Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

15 KIT-CERT Andreas Lorenz IT-Security at Karlsruhe Institute of Technology

16 Thank you for your attention STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State of Baden-Württemberg and National Laboratory of the Helmholtz Association

Energy research at KIT

Energy research at KIT Energy research at KIT 25. October 2011 2 nd Workshop of Dr.-Ing. Joachim U. Knebel, Chief Science Officer Bereich 4 KIT University of the State of Baden-Wuerttemberg and National Research Center of the

More information

Steinbuch Centre for Computing (SCC) The Information Technology Centre of KIT

Steinbuch Centre for Computing (SCC) The Information Technology Centre of KIT Steinbuch Centre for Computing (SCC) The Information Technology Centre of KIT SCIENTIFIC COMPUTING, HPC AND GRIDS KIT the cooperation of Forschungszentrum Karlsruhe GmbH and Universität Karlsruhe (TH)

More information

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence IBM Security Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence Peter Kurfürst Vertrieb IBM Security Lösungen Enterprise-Kunden Baden-Württemberg

More information

The cloud storage service bwsync&share at KIT

The cloud storage service bwsync&share at KIT The cloud storage service bwsync&share at KIT Alexander Yasnogor, Nico Schlitter, Andreas Petzold @CERN, Workshop on Cloud Services for File Synchronisation and Sharing STEINBUCH CENTRE FOR COMPUTING -

More information

Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität

Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität Fraunhofer Institute for Secure Information Technology App Rasterfahndung: auf der Suche nach Sicherheitsqualität Dr. Jens Heider Head of Department Testlab Mobile Security Amt für Wirtschaft und Stadtentwicklung,

More information

SimLabs at KIT, a Strategy for the Future

SimLabs at KIT, a Strategy for the Future SimLabs at KIT, a Strategy for the Future [email protected] STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State of Baden-Württemberg and National Research Center of the Helmholtz Association

More information

Network and Security Controls

Network and Security Controls Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting

More information

Commercial Practices in IA Testing Panel

Commercial Practices in IA Testing Panel Commercial Practices in IA Testing Panel March 22, 2001 Albuquerque, New Mexico First Information Assurance Testing Conference Sponsored by: Director, Operational Test and Evaluation Panel Members! Dr.

More information

KIT Site Report. Andreas Petzold. www.kit.edu STEINBUCH CENTRE FOR COMPUTING - SCC

KIT Site Report. Andreas Petzold. www.kit.edu STEINBUCH CENTRE FOR COMPUTING - SCC KIT Site Report Andreas Petzold STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State of Baden-Württemberg and National Laboratory of the Helmholtz Association www.kit.edu GridKa Tier 1 - Batch

More information

Solutions for energy efficient buildings and cities

Solutions for energy efficient buildings and cities Solutions for energy efficient buildings and cities M.Sc Preslava Krahtova Research associate Institut for Information Management in Engineering (IMI) www.kit.edu Outline Short presentation at KIT Research

More information

Image Data, RDA and Practical Policies

Image Data, RDA and Practical Policies Image Data, RDA and Practical Policies Rainer Stotzka and many others KIT University of the State of Baden-Württemberg and National Laboratory of the Helmholtz Association www.kit.edu Data Life Cycle Lab

More information

INFORMATION SECURITY Humboldt State University

INFORMATION SECURITY Humboldt State University CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY Humboldt State University Audit Report 14-50 October 30, 2014 EXECUTIVE SUMMARY OBJECTIVE The objectives of

More information

Cloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay ([email protected])

Cloud Performance Group 1. Cloud@Night Event. 14. Januar 2016 / Matthias Gessenay (matthias.gessenay@corporatesoftware.ch) 1 Cloud@Night Event 14. Januar 2016 / Matthias Gessenay ([email protected]) 2 Agenda SharePoint ABC Project Server ABC What s new in O365 4 SharePoint 2016 ABC A Access App-Support

More information

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014

ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 ISO/IEC 27001:2013 Thema Änderungen der Kontrollen der ISO/IEC 27001:2013 im Vergleich zur Fassung aus 2005 Datum 20.01.2014 Legende: gering mittel hoch Änderungsgrad A.5 Information security policies

More information

Safe Harbor Statement

Safe Harbor Statement Logging & Debugging von M(obile)AF Applikationen Jürgen Menge Sales Consultant Oracle Deutschland B.V. & Co. KG Safe Harbor Statement The following is intended to outline our general product direction.

More information

Lustre tools for ldiskfs investigation and lightweight I/O statistics

Lustre tools for ldiskfs investigation and lightweight I/O statistics Lustre tools for ldiskfs investigation and lightweight I/O statistics Roland Laifer STEINBUCH CENTRE FOR COMPUTING - SCC KIT University of the State Roland of Baden-Württemberg Laifer Lustre and tools

More information

POSTAL REGULATORY COMMISSION

POSTAL REGULATORY COMMISSION POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1

More information

Additional Security Considerations and Controls for Virtual Private Networks

Additional Security Considerations and Controls for Virtual Private Networks CYBER SECURITY OPERATIONS CENTRE APRIL 2013 (U) LEGAL NOTICE: THIS PUBLICATION HAS BEEN PRODUCED BY THE DEFENCE SIGNALS DIRECTORATE (DSD), ALSO KNOWN AS THE AUSTRALIAN SIGNALS DIRECTORATE (ASD). ALL REFERENCES

More information

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry

More information

SOLARIS 10 SECURITY. Technical Overview. Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH

SOLARIS 10 SECURITY. Technical Overview. Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH SOLARIS 10 SECURITY Technical Overview Andreas Neuhold Systems Practice Lead Austria Sun Microsystems, GesmbH Solaris 10 Lizenzen Millions ~ 7M ZFS 7,0 6,5 6,0 5,5 Solaris Container 5,0 4,5 4,0 3,5 3,0

More information

Utica College. Information Security Plan

Utica College. Information Security Plan Utica College Information Security Plan Author: James Farr (Information Security Officer) Version: 1.0 November 1 2012 Contents Introduction... 3 Scope... 3 Information Security Organization... 4 Roles

More information

The Helmholtz Alliance for Astroparticle Physics

The Helmholtz Alliance for Astroparticle Physics The Helmholtz Alliance for Astroparticle Physics Johannes Blümer Information to ISAPP, October 21, 2011 KIT-Centrum Elementarteilchen- und Astroteilchenphysik KCETA KIT Universität des Landes Baden-Württemberg

More information

Network Security Policy

Network Security Policy Network Security Policy Policy Contents I. POLICY STATEMENT II. REASON FOR POLICY III. SCOPE IV. AUDIENCE V. POLICY TEXT VI. PROCEDURES VII. RELATED INFORMATION VIII. DEFINITIONS IX. FREQUENTLY ASKED QUESTIONS

More information

Network Security Policy

Network Security Policy Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus

More information

OPP CITY SCHOOLS JOB DESCRIPTION. (1) Master s degree from an accredited educational institution.

OPP CITY SCHOOLS JOB DESCRIPTION. (1) Master s degree from an accredited educational institution. OPP CITY SCHOOLS ASSISTANT PRINCIPAL, ELEMENTARY SCHOOL JOB DESCRIPTION QUALIFICATIONS: (1) Master s degree from an accredited educational institution. (2) Certification in Educational Leadership, School

More information

Cloud Roadmap to Success. October, 2014

Cloud Roadmap to Success. October, 2014 Cloud Roadmap to Success October, 2014 Catapult Systems & Level 3 Today s Presenters [email protected] [email protected] What is the Cloud Technology trends: driving cloud adoption

More information

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS CYBER ATTACKS INFILTRATE CRITICAL INFRASTRUCTURE SECTORS Government and enterprise critical infrastructure sectors such as energy, communications

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH

SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH SECURITY REDEFINED Managing risk and securing the business in the age of the third platform Sabine Bendiek, Geschäftsführerin EMC Deutschland GmbH 1 BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF

More information

Director Global IT Service Delivery Information Services

Director Global IT Service Delivery Information Services Director Global IT Service Delivery Information Services Reporting to: Chief Information Officer Salary: Competitive package Job Family and level: 7 Contract Status: Permanent Hours of Work: Full time

More information

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems IBM Global Services ISS X-Force Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems Internet Security Systems, an IBM Company Security Market Overview Companies face sophisticated

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

The KOALA Cloud Management Service

The KOALA Cloud Management Service The KOALA Cloud Management Service A Modern Approach for Cloud Infrastructure Management CloudCP 1 st International Workshop on Cloud Computing Platforms at EuroSys 2011 Christian Baun, Marcel Kunze April

More information

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy

2009 NASCIO Recognition Awards Nomination. A. Title: Sensitive Data Protection with Endpoint Encryption. Category: Information Security and Privacy 2009 NASCIO Recognition Awards Nomination A. Title: Sensitive Data Protection with Endpoint Encryption Category: Information Security and Privacy State: Ohio B. Executive Summary Protecting the confidentiality

More information

Testen mit Produktionsdaten Fluch oder Segen?

Testen mit Produktionsdaten Fluch oder Segen? Testen mit Produktionsdaten Fluch oder Segen? Thomas Baumann Die Mobiliar ISACA After Hours Seminar Dienstag, 30.Oktober 2012 2 Agenda PART I: Copy from Production to Test Requirements Solutions and experiences

More information

SIMATIC Remote Services. Industry Services

SIMATIC Remote Services. Industry Services Industry Services SIMATIC Remote Services Proactive remote support for the SIMATIC automation system optimum support for the efficient operation of your plant siemens.com/siremote Proactive Virus Pattern

More information

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS

IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES

More information

2015 Global Study on IT Security Spending & Investments

2015 Global Study on IT Security Spending & Investments 2015 Study on IT Security Spending & Investments Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Sponsored by Part 1. Introduction Security risks are pervasive and becoming

More information

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI

Introduction. Purpose. Reference. Applicability. HIPAA Policy 7.1. Safeguards to Protect the Privacy of PHI Office of Regulatory Compliance 13001 E. 17 th Place, Suite W1124 Mail Stop F497 Aurora, CO 80045 Main Office: 303-724-1010 Main Fax: 303-724-1019 HIPAA Policy 7.1 Title: Source: Prepared by: Approved

More information

INFORMATION SECURITY California Maritime Academy

INFORMATION SECURITY California Maritime Academy CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California Maritime Academy Audit Report 14-54 April 8, 2015 Senior Director: Mike Caldera IT Audit Manager:

More information

The STAGEnet Security Model

The STAGEnet Security Model NDSU 2015 Cyber Security Conference The STAGEnet Security Model Peeling Away the Layers March 17, 2015 NDSU Memorial Union Rose Room NDSU 2015 Cyber Security Conference Art Bakke Enterprise Information

More information

UF IT Risk Assessment Standard

UF IT Risk Assessment Standard UF IT Risk Assessment Standard Authority This standard was enacted by the UF Senior Vice President for Administration and the UF Interim Chief Information Officer on July 10, 2008 [7]. It was approved

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Personal Security Practices of the CAO

Personal Security Practices of the CAO Personal Security Practices of the CAO 1. Do you forward your government email to your personal email account? 2. When is the last time you changed your Enterprise password? Within the last 60 days Within

More information

Mobile device Management mit NAC

Mobile device Management mit NAC Mobile device Management mit NAC [email protected] 2012 ForeScout Technologies, Page 1 Die NAC Lösung Although approaches such as server-based computing and virtualization will also be used to deal

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev. 01. . Seite 1 von 11. 521d Seite 1 von 11

Dokument Nr. 521.dw Ausgabe Februar 2013, Rev. 01. . Seite 1 von 11. 521d Seite 1 von 11 Eidgenössisches Departement für Wirtschaft, Bildung und Forschung WBF Staatssekretariat für Wirtschaft SECO Schweizerische Akkreditierungsstelle SAS Checkliste für die harmonisierte Umsetzung der Anforderungen

More information

Netzwerkvirtualisierung? Aber mit Sicherheit!

Netzwerkvirtualisierung? Aber mit Sicherheit! Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction

More information

Central Agency for Information Technology

Central Agency for Information Technology Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage

More information

Access control policy: Role-based access

Access control policy: Role-based access Access control policy: Role-based access As subjects (a person or automated agent) often change roles within an organization, it is best to define an access control policy based on the roles they play.

More information

Managing Information Resources and IT Security

Managing Information Resources and IT Security Managing Information Resources and IT Security Management Information Code: 164292-02 Course: Management Information Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic

More information

Open Access Publishing to Support Geothermal Research

Open Access Publishing to Support Geothermal Research Open Access Publishing to Support Geothermal Research Ernst Huenges, GfZ Potsdam Thomas Kohl, KIT KIT University of the State of Baden-Württemberg and National Large-scale Research Center of the Helmholtz

More information

University of Wisconsin-Madison Policy and Procedure

University of Wisconsin-Madison Policy and Procedure Page 1 of 14 I. Policy II. A. The, the units of the UW-Madison Health Care Component and each individual or unit within UW-Madison that is a Business Associate of a covered entity (hereafter collectively

More information

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES

Enterprise SM VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES VOLUME 1, SECTION 5.1: MANAGED TIERED SECURITY SERVICES 5.1 MANAGED TIERED SECURITY SERVICES [C.2.7.4, M.2.1.3] Level 3 will support the GSA s Multi-Tier Security Profiles (MTSP) initiative in accordance

More information

CDW Advanced Image Deployment Service Customer Guide

CDW Advanced Image Deployment Service Customer Guide CDW Advanced Image Deployment Service Customer Guide Contents Service Description... 2 Image Deployment Solutions... 2 Why would my organization use this service?... 2 Benefits of Advanced Imaging over

More information

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management

Log Management How to Develop the Right Strategy for Business and Compliance. Log Management Log Management How to Develop the Right Strategy for Business and Compliance An Allstream / Dell SecureWorks White Paper 1 Table of contents Executive Summary 1 Current State of Log Monitoring 2 Five Steps

More information

Self defending networks?

Self defending networks? Self defending networks? What we do @ Voith to protect our network. Troopers08, 23.-24.03.08 Munich, Germany Content Author 2 Troopers08 Self Defending Networks 23.04.2008 Global Voith IT Organisation

More information

GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK

GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK GERMAN UNIVERSITIES LIAISON OFFICES NEW YORK German University Alliance (FU Berlin / LMU München) ConRuhr (Dortmund/ Duisburg-Essen / Bochum) Universität Heidelberg RWTH Aachen UAS 7 Hessen Universities

More information

Firewalls, Tunnels, and Network Intrusion Detection

Firewalls, Tunnels, and Network Intrusion Detection Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls

More information

Sample Employee Network and Internet Usage and Monitoring Policy

Sample Employee Network and Internet Usage and Monitoring Policy CovenantEyes Internet Accountability and Filtering Sample Employee Network and Internet Usage and Monitoring Policy Covenant Eyes is committed to helping your organization protect your employees and members

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

Policy. London School of Economics & Political Science. Application Control. Jethro Perkins Information Security Manager IMT

Policy. London School of Economics & Political Science. Application Control. Jethro Perkins Information Security Manager IMT London School of Economics & Political Science IMT Policy Application Control Jethro Perkins Information Security Manager Summary This document outlines IMT s application control policy, as endorsed by

More information

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium

VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management

More information

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011

Junos Pulse. Uwe Nelkel Business Development Manager Junos Pulse. IBM Golf Cup, Golfclub Holledau, September 14 th 2011 Junos Pulse Uwe Nelkel Business Development Manager Junos Pulse IBM Golf Cup, Golfclub Holledau, September 14 th 2011 Legal Statement This product roadmap sets forth Juniper Networks current intention

More information

How To Understand And Understand Rwth Aachen University

How To Understand And Understand Rwth Aachen University A short introduction to RWTH Location of RWTH Aachen University RWTH Mainbuilding Development of RWTH Aachen University until 2004 Students Foreign Students Polytechnical School Faculty of Architecture

More information

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved.

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved. Patch Management Is it recommended to patch an Industrial Automation Control System and, if so, why? Facts Most of the computer components of modern Industrial Automation Control System are based on standard

More information

Smart Data Innovation Lab (SDIL)

Smart Data Innovation Lab (SDIL) Smart Data Innovation Lab (SDIL) Accelerating Data driven Innovation NESSI Summit May 27, 2014 Prof. Dr.-Ing. Michael Beigl Department of Informatics KIT University of the State of Baden-Wuerttemberg and

More information

Citrix Enterprise Mobility more than just device management (MDM)

Citrix Enterprise Mobility more than just device management (MDM) Citrix Enterprise Mobility more than just device management (MDM) [email protected] Manager, Channel Readiness Central Europe The only reason why IT exists: APPLICATIONS! 3 The reality: Customer

More information

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security

Industrie 4.0. Towards a Holistic Approach for Cyber Safety and Security Industrie 4.0 Towards a Holistic Approach for Cyber Safety and Security Prof. Dr.-Ing. Reiner Anderl Marco Grimm, M.Sc. Datenverarbeitung in der Konstruktion (DiK) Fachbereich Maschinenbau Technische Universität

More information

JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN For Assignments

JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN For Assignments NAME: COUNTRY: SPONSOR: DIV/GROUP: PURPOSE: To be filled out by FACTS administrator FACTS Visitor # FACTS Request # JEFFERSON LAB Unclassified Foreign Visits & Assignments Program GENERIC SECURITY PLAN

More information

Security Control Standard

Security Control Standard Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the

More information

The Oracle Mobile Security Suite: Secure Adoption of BYOD

The Oracle Mobile Security Suite: Secure Adoption of BYOD An Oracle White Paper April 2014 The Oracle Mobile Security Suite: Secure Adoption of BYOD Executive Overview BYOD (Bring Your Own Device) is the new mobile security imperative and every organization will

More information

Supplier Security Assessment Questionnaire

Supplier Security Assessment Questionnaire HALKYN CONSULTING LTD Supplier Security Assessment Questionnaire Security Self-Assessment and Reporting This questionnaire is provided to assist organisations in conducting supplier security assessments.

More information