IT-sikkerhedssystem. Rockwool International. DAu Konference: Industriel IT sikkerhed

Size: px
Start display at page:

Download "IT-sikkerhedssystem. Rockwool International. DAu Konference: Industriel IT sikkerhed"

Transcription

1 IT-sikkerhedssystem hos Rockwool International DAu Konference: Industriel IT sikkerhed

2 DAu Konference: Industriel IT sikkerhed IT-sikkerheds-system hos Rockwool International Baggrund Siemens Security Assessment Struktureret tilgang: Work Packages Løsninger 2

3 Præsentation Flemming Schou Section Manager: Automation & Electrical Standards Rockwool International Lars Peter Hansen Produktchef - Industrial Communication Lars-peter.hansen@siemens.com T.: M.:

4 Baggrund for øget Security i Rockwool Krav fra Ejer/Bestyrelse/Management om øget security niveau pga. ny fabrik i Kina Projekt aflyst/udskudt, men koncept fortsat i Memphis, USA Ledelse ønskede et eksternt view på sikkerhedsniveau og action plan Krævede øget samarbejde mellem Engineering og IT

5 Security Assessment Assement by Siemens Industrial Security

6 Work Packages Afklaring af områder

7 Løsninger Løsninger implementeret: Netværkssegmentering Layers/Celler Portblokering/MAC filtrering Hardware Protection af PLC er Block Privacy udvalgte blokke Ikke AD på PLC Net, men Password database PC hardening Standard image fra IT MED MODIFIKATIONER Adm konto for at installere/ændre Antivirus Patching Ikke Automatisk AD Autentifikering Alle Stationer på PC automationsnettet (RockNet) Access: Remote WiFi (Web baseret adgang f.eks 30 dage til MAC adresse) Jumpstation/Access Management Disaster recovery: BackUp System

8 Løsninger Løsninger implementeret: Netværkssegmentering Layers/Celler Portblokering/MAC filtrering Hardware Protection af PLC er Block Privacy udvalgte blokke Ikke AD på PLC Net, men Password database PC hardening Standard image fra IT MED MODIFIKATIONER Adm konto for at installere/ændre Antivirus Patching Ikke Automatisk AD Autentifikering Alle Stationer på PC automationsnettet (RockNet) Access: Remote WiFi (Web baseret adgang f.eks 30 dage til MAC adresse) Jumpstation/Access Management Disaster recovery: BackUp System

9 Rocknet, Office network POP Label RF RockFact Client Control room Access Management PC PC Automation network WinCC Clients Firewall File for Acronis Backups RockFact/POP Gateway Engineering Station Label Printer, WinCC 1 WinCC 2 Daneel, (X-Ray) CP1613 Label PC Label PLC PLC Automation network PLC PLC Charging Spinner PLC Wool Collecrtion PLC. PLC

10 Forudsætninger hvad sker der? og, stil krav til din leverandør ICS-CERT update: Unrestricted / Siemens AG All Rights Reserved. Page 10 V1.0

11 Løsninger Løsninger implementeret: Netværkssegmentering Layers/Celler Portblokering/MAC filtrering Hardware Protection af PLC er Block Privacy udvalgte blokke Ikke AD på PLC Net, men Password database PC hardening Standard image fra IT MED MODIFIKATIONER Adm konto for at installere/ændre Antivirus Patching Ikke Automatisk AD Autentifikering Alle Stationer på PC automationsnettet (RockNet) Access: Remote WiFi (Web baseret adgang f.eks 30 dage til MAC adresse) Jumpstation/Access Management Disaster recovery: BackUp System

12 Rocknet, Office network POP Label RF RockFact Client Control room Access Management PC PC Automation network WinCC Clients Firewall File for Acronis Backups RockFact/POP Gateway Engineering Station Label Printer, WinCC 1 WinCC 2 Daneel, (X-Ray) CP1613 Label PC Label PLC PLC Automation network PLC PLC Charging Spinner PLC Wool Collecrtion PLC. PLC

13 Industrial Security the Defense in Depth Concept Fysisk adgangskontrol Processer og guidelines Segmentering Firewalls & VPN Whitelisting System Hardening Autentificering Patch management Intrusion detection Virusscannere Træning Unrestricted / Siemens AG All Rights Reserved. Page 13 V1.0

14 Løsninger Løsninger implementeret: Netværkssegmentering Layers/Celler Portblokering/MAC filtrering Hardware Protection af PLC er Block Privacy udvalgte blokke Ikke AD på PLC Net, men Password database PC hardening Standard image fra IT MED MODIFIKATIONER Adm konto for at installere/ændre Antivirus Patching Ikke Automatisk AD Autentifikering Alle Stationer på PC automationsnettet (RockNet) Access: Remote WiFi (Web baseret adgang f.eks 30 dage til MAC adresse) Jumpstation/Access Management Disaster recovery: BackUp System

15 Rocknet, Office network Firewall POP Label RF RockFact Client Control room Access Management PC PC Automation network WinCC Clients Firewall File for Acronis Backups RockFact/POP Gateway Engineering Station Label Printer, WinCC 1 WinCC 2 Daneel, (X-Ray) CP1613 Label PC Label PLC Laptop for maintenance/ commissioning PLC Automation network PLC PLC Charging Spinner PLC Wool Collecrtion PLC. PLC

16 Password problematikken Static Shared Secret Og sårbar over for Man-in-the-Middel Atack Sårbar over for Man-in-the-Middel Atack Unrestricted / Siemens AG All Rights Reserved. Page 16 V1.0

17 Centraliseret User og Password Management Clients Control Center Application Virtualization Secure Access Manager Firewall High Availability (optional) Active Directory (optional) RSA Authentication (optional) WAN Client Substation Maskine/Process/Substation/RTU Unrestricted / Siemens AG All Rights Reserved. Page 17 V1.0

18 Løsninger Løsninger implementeret: Netværkssegmentering Layers/Celler Portblokering/MAC filtrering Hardware Protection af PLC er Block Privacy udvalgte blokke Ikke AD på PLC Net, men Password database PC hardening Standard image fra IT MED MODIFIKATIONER Adm konto for at installere/ændre Antivirus Patching Ikke Automatisk AD Autentifikering Alle Stationer på PC automationsnettet (RockNet) Access: Remote WiFi (Web baseret adgang f.eks 30 dage til MAC adresse) Jumpstation/Access Management Disaster recovery: BackUp System

19 Label POP RF Access Management PC RockFact Client Control room Avamar (Data Center) Rocknet, Office network WinCC Client WinCC Client WinCC Client WinCC Client WinCC Client WinCC Client WinCC Client File for Acronis Backups Firewall PC Automation network Label PC PMS WinCC 1 WinCC 2 RockFact/POP Gateway PC Engineering Station GRIT Responsibility - Avamar GPR Responsibility - Acronics Label Printer, Label PLC PLC / Automation network PLC PLC PLC PLC PLC PLC PLC 4

20 Industrial Security Opsummering Fokus på security er kritisk Hardning af systemer anvend eksisterende muligheder Segmentér netværk og isolér sårbare systemer Anvend Jump Stations og brug certificerede produkter Stil krav til autentificering og brug passwords Implementer centrale autentificeringsløsninger Backup og forbered Disaster Recovery Unrestricted / Siemens AG All Rights Reserved. Page 20 V1.0

Agenda - Remote Access i Rockwool

Agenda - Remote Access i Rockwool Agenda - Remote Access i Rockwool Introduktion Speaker/Rockwool præsentation/introduktion Remote access i Rockwool Netværk, Remote funktioner Software.Net, Låste PC er Trust, Software, Adgang Bruger kontrol,

More information

Innovation Days Industrial Communication

Innovation Days Industrial Communication Innovation Days Industrial Communication Industrial Security siemens.com/industrial-security London 1903 Royal Institution s lecture theatre Verdenspremiere på den trådløse telegraf Source: https://www.newscientist.com/article/mg21228440-700-dot-dash-diss-the-gentleman-hackers-1903-lulz/#.vrprl-e2wn8

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

2 halvleg. 1 halvleg. Opvarmning. 2 halvleg. 3 halvleg. Advanced & Powerful. Basic PC-based Automation. Diagnose. Online Tools & Add-on s

2 halvleg. 1 halvleg. Opvarmning. 2 halvleg. 3 halvleg. Advanced & Powerful. Basic PC-based Automation. Diagnose. Online Tools & Add-on s Opvarmning 1 halvleg 2 halvleg 3 halvleg Basic PC-based Automation Advanced & Powerful PC-based Automation Online Tools & Add-on s PC-based Automation Diagnose PC-based Automation Mall www.siemens.dk/mall

More information

Nyheder i SAS Data Management med SAS version 9.4 Jens Dahl Mikkelsen Nordic CoE, Information Management

Nyheder i SAS Data Management med SAS version 9.4 Jens Dahl Mikkelsen Nordic CoE, Information Management make connections share ideas be inspired Nyheder i SAS Data Management med SAS version 9.4 Jens Dahl Mikkelsen Nordic CoE, Information Management Indhold Nye pakker nye muligheder Nyheder med SAS 9.4-baseret

More information

Trådløs forbindelse. Juni 2011. Peter Fuglsang Product Application Engineer Automation

Trådløs forbindelse. Juni 2011. Peter Fuglsang Product Application Engineer Automation Trådløs forbindelse Juni 2011 Peter Fuglsang Product Application Engineer Automation Trådløs kommunikation Definition af netværk Trådløse produkter fra Schneider Electric RTU moduler Trådløse Løsninger

More information

Protecting productivity with Plant Security Services

Protecting productivity with Plant Security Services Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services

More information

PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy

PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy PCN Cyber-security Considerations for Manufacturers Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy Contents CPChem PCN Philosophy and Policy Remote Access Considerations

More information

Data Security and Healthcare

Data Security and Healthcare Data Security and Healthcare Complex data flows Millions of electronic medical records across many systems New and emerging business relationships Changing and maturing compliance frameworks Diverse population

More information

BM482E Introduction to Computer Security

BM482E Introduction to Computer Security BM482E Introduction to Computer Security Lecture 7 Database and Operating System Security Mehmet Demirci 1 Summary of Lecture 6 User Authentication Passwords Password storage Password selection Token-based

More information

vfredag Velkommen tilbage VMware Danmark 7 Marts 2014 2014 VMware Inc. All rights reserved.

vfredag Velkommen tilbage VMware Danmark 7 Marts 2014 2014 VMware Inc. All rights reserved. vfredag Velkommen tilbage VMware Danmark 7 Marts 2014 2014 VMware Inc. All rights reserved. Agenda Nye Systems Engineers hos VMware Danmark Tiltag fra VMware Danmark Whats New Agenda til næste vfredag

More information

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Security for. Industrial. Automation. Considering the PROFINET Security Guideline Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures

More information

Hot & New in Symantec Management and Windows Protection

Hot & New in Symantec Management and Windows Protection [Technology Days 2010] Hot & New in Symantec and Windows Protection Finn Henningsen & Wael Al Assadi Hot & New in Symantec and Windows Protection AGENDA 1 2 3 Intro Storage /Wael Al Assadi Assadi Endpoint

More information

Water and Environment Theme

Water and Environment Theme University of Copenhagen Water and Environment Theme Peter E. Holm and Jørgen E. Olesen Contributing Danish Institutions: Aarhus University University of Southern Denmark Technical University of Denmark

More information

Network and Security Controls

Network and Security Controls Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting

More information

OIO Dekstop applikation

OIO Dekstop applikation OIO Dekstop applikation 25-09-2009. Version 1.0 Sammendrag af ideer og dialog på møde d. 24-09-2009 mellem ITST, Trifork og Designit Under udarbejdelse Diagram Test applikation Grupper Digitaliser.dk Applikation

More information

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com NERC CIP Substation Cyber Security Update John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com It s February 19, 2009 132 project days left to compliance Do you know where (what)

More information

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams

More information

Network Documentation Checklist

Network Documentation Checklist Network Documentation Checklist Don Krause, Creator of NetworkDNA This list has been created to provide the most elaborate overview of elements in a network that should be documented. Network Documentation

More information

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry. Security all around Industrial security for your plant at all levels siemens.com/industrialsecurity Answers for industry. A systematic approach to minimize threats With the increased use of Ethernet connections

More information

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com NERC CIP Substation Cyber Security Update John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com It s February 19, 2009 132 project days left to compliance Do you know where (what)

More information

Software Defined Data Center #EMCForum 2014 - København

Software Defined Data Center #EMCForum 2014 - København Software Defined Data Center #EMCForum 2014 - København Mads Sørensen Manager, Cloud Platforms TDC Hosting 51 22 44 26 mobil ms@tdchosting.dk Twitter: @madssoerensen Agenda Intro Why the Software Defined

More information

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

Name: Position held: Company Name: Is your organisation ISO27001 accredited: Third Party Information Security Questionnaire This questionnaire is to be completed by the system administrator and by the third party hosting company if a separate company is used. Name: Position held:

More information

How To Create A Visual Analytics System

How To Create A Visual Analytics System make connections share ideas be inspired SAS Visual Analyticsarkitektur Thomas Damgaard Seniorkonsulent Agenda Hvad er SAS Visual Analytics? Arkitektur Tekniske krav Implementering Spørgsmål Hvad er SAS

More information

IP Next-Generation Networks. IP NGN rejsen. Henrik Boye. Marts 2007

IP Next-Generation Networks. IP NGN rejsen. Henrik Boye. Marts 2007 IP Next-Generation Networks IP NGN rejsen Henrik Boye Marts 2007 1 SP Breakout 11.15-12.00 provider markedet IP NGN Overview Henrik Boye, Regional Sales Manager, Cisco Danmark 12.00-12.45 The technology

More information

NETWORK SECURITY GUIDELINES

NETWORK SECURITY GUIDELINES NETWORK SECURITY GUIDELINES VIRUS PROTECTION STANDARDS All networked computers and networked laptop computers are protected by GST BOCES or district standard anti-virus protection software. The anti-virus

More information

The User is Evolving. July 12, 2011

The User is Evolving. July 12, 2011 McAfee Enterprise Mobility Management Securing Mobile Applications An overview for MEEC The User is Evolving 2 The User is Evolving 3 IT s Challenge with Mobile Devices Web 2.0, Apps 2.0, Mobility 2.0

More information

Client Security Risk Assessment Questionnaire

Client Security Risk Assessment Questionnaire Select the appropriate answer from the drop down in the column, and provide a brief description in the section. 1 Do you have a member of your organization with dedicated information security duties? 2

More information

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST Application Name: Vendor Name: Briefly describe the purpose of the application. Include an overview of the application architecture, and identify the data

More information

Simplifying Security & Compliance Innovating IT Managed Services. Data Security Threat Landscape and IT General Controls

Simplifying Security & Compliance Innovating IT Managed Services. Data Security Threat Landscape and IT General Controls Simplifying Security & Compliance Innovating IT Managed Services Data Security Threat Landscape and IT General Controls Audit Standards and IT General Controls General IT controls discussed in AUC Section

More information

Module 5 Introduction to Processes and Controls

Module 5 Introduction to Processes and Controls IT Terminology 1. General IT Environment The general IT environment is the umbrella over the following IT processes: 1. Operating Systems 2. Physical and Logical Security 3. Program Changes 4. System Development

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Developing Network Security Strategies

Developing Network Security Strategies NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

Solving the Desktop Dilemma

Solving the Desktop Dilemma Solving the Desktop Dilemma Enterprise Desktop Solutions Raymond Sleiman DL Groupe GMG rsleiman@dlge.ch Mobile :079 200 81 03 Agenda What is VMware View 3 What s new with VMware View 3 Architecture RTO

More information

INCIDENT RESPONSE CHECKLIST

INCIDENT RESPONSE CHECKLIST INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged

More information

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved.

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved. Patch Management Is it recommended to patch an Industrial Automation Control System and, if so, why? Facts Most of the computer components of modern Industrial Automation Control System are based on standard

More information

Questionnaire #1: The Patient (Spørgeskema, må gerne besvares på dansk)

Questionnaire #1: The Patient (Spørgeskema, må gerne besvares på dansk) Table of Contents Questionnaire #1: The Patient... 2 Questionnaire #2: The Medical Staff... 4 Questionnaire #3: The Visitors... 6 Questionnaire #4: The Non-Medical Staff... 7 Page1 Questionnaire #1: The

More information

activecho Driving Secure Enterprise File Sharing and Syncing

activecho Driving Secure Enterprise File Sharing and Syncing activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get

More information

Disaster Recovery Checklist Disaster Recovery Plan for <System One>

Disaster Recovery Checklist Disaster Recovery Plan for <System One> Disaster Recovery Plan for SYSTEM OVERVIEW PRODUCTION SERVER HOT SITE SERVER APPLICATIONS (Use bold for Hot Site) ASSOCIATED SERVERS KEY CONTACTS Hardware Vendor System Owners Database Owner

More information

Velkommen til Innovation Days PC-based Automation

Velkommen til Innovation Days PC-based Automation Velkommen til Innovation Days PC-based Automation - En dag med Superligaen.. Restricted Siemens AG 20XX siemens.com Agenda 08:45 09:15 Morgenmad 09:15 09:45 Holdopstilling og taktikmøde 09:45 10:45 Opvarmning

More information

Oversættelse af symbolsk maskinsprog. Sammenkædning og indlæsning af maskinsprog

Oversættelse af symbolsk maskinsprog. Sammenkædning og indlæsning af maskinsprog Oversættelse af symbolsk maskinsprog Sammenkædning og indlæsning af maskinsprog Niveauer af abstrakte maskiner Spørgsmål... Hvordan bruges asm-niveauet? metode til programmering Hvordan stilles asm-niveauet

More information

Agil Business Process Management - i Finans

Agil Business Process Management - i Finans Agil Business Process Management - i Finans Thomas Hildebrandt Lektor, PhD Leder af gruppen for Proces- & Systemmodeller ved IT Universitetet i København og Interessegruppen for processer og IT ved Infinit

More information

De tidlige udviklingsfaser Idé fasen og ContinuaHealth Alliance. Eva Kühne, forretningsudvikler DELTA Brian Hedegaard, Business Manager DELTA

De tidlige udviklingsfaser Idé fasen og ContinuaHealth Alliance. Eva Kühne, forretningsudvikler DELTA Brian Hedegaard, Business Manager DELTA De tidlige udviklingsfaser Idé fasen og ContinuaHealth Alliance Eva Kühne, forretningsudvikler DELTA Brian Hedegaard, Business Manager DELTA DELTA Highlights 270 employees out of which 50% are engineers

More information

Technical Brief: Virtualization

Technical Brief: Virtualization Technical Brief: Virtualization Technology Overview Tempered Networks automates connectivity and network security for distributed devices over trusted and untrusted network infrastructure. The Tempered

More information

Smart Substation Security

Smart Substation Security Smart Substation Security SmartSec Europe 2014 Amsterdam 29/01/2014 Agenda Context Elia Introduction to the substation environment in Elia Security design and measures in the substation Near and far future

More information

Remote Disaster Recovery Services Suite (nvision Edition)

Remote Disaster Recovery Services Suite (nvision Edition) Remote Disaster Recovery Services Suite (nvision Edition) Services Suite includes Remote Backup Service Comprehensive suite of services designed to get you back up and running quickly and successfully

More information

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool

Contents. Instructions for Using Online HIPAA Security Plan Generation Tool Instructions for Using Online HIPAA Security Plan Generation Tool Contents Step 1 Set Up Account... 2 Step 2 : Fill out the main section of the practice information section of the web site.... 3 The next

More information

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4

Understanding the Pros and Cons of Combination Networks 7. Acknowledgments Introduction. Establishing the Numbers of Clients and Servers 4 Mac OS X System Administration GUY HART-DAVIS Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Acknowledgments Introduction,

More information

Dr. György Kálmán gyorgy@mnemonic.no

Dr. György Kálmán gyorgy@mnemonic.no COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats

More information

Etablering af krav (kap 10)

Etablering af krav (kap 10) Etablering af krav (kap 10) Marianne Graves Petersen Associate Professor Computer Science Dept, University of Aarhus Center for Interactive Spaces, mgraves@cs.au.dk Interaktionsdesign processen Identificer

More information

Security Controls What Works. Southside Virginia Community College: Security Awareness

Security Controls What Works. Southside Virginia Community College: Security Awareness Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction

More information

Indenfor projektledelse

Indenfor projektledelse Best Practice Indenfor projektledelse 14. maj 2007 Agenda Position of PRINCE2, IMPA and PMI to other methods and standards Explain structure and concepts of the IPMA PMI, and PRINCE2 Other Standards and

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015 Siemens Osakeyhtiö Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015 Restricted Siemens Osakeyhtiö 2015. All Rights Reserved. siemens.fi/answers Cyber security

More information

Arkivering: Gab, hvor kedeligt kan det blive++..

Arkivering: Gab, hvor kedeligt kan det blive++.. Arkivering: Gab, hvor kedeligt kan det blive++.. Steen Balle, Arrow ECS Jesper Lundbæk, Hitachi Data Systems Terkel Steenholt, Hitachi Data Systems 1 Hitachi Data Systems Corporation 2011. All Rights Reserved.

More information

C101 03 CMRR Computer Resources Overview

C101 03 CMRR Computer Resources Overview University of Minnesota Center for Magnetic Resonance Research Standard Operating Procedure C101 03 CMRR Computer Resources Overview Here are some basic facts about the CMRR computer resources to help

More information

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for

More information

SPDE. Lagring af større datamængder. make connections share ideas be inspired. Henrik Dorf Chefkonsulent SAS Institute A/S

SPDE. Lagring af større datamængder. make connections share ideas be inspired. Henrik Dorf Chefkonsulent SAS Institute A/S make connections share ideas be inspired SPDE Lagring af større datamængder Henrik Dorf Chefkonsulent SAS Institute A/S SPDE Scalable Performance Data Engine I/O delen af SPDServer software Følger med

More information

Remote Access Considered Dangerous. Andrew Ginter, VP Industrial Security Waterfall Security Solutions

Remote Access Considered Dangerous. Andrew Ginter, VP Industrial Security Waterfall Security Solutions Access Considered Dangerous Andrew Ginter, VP Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright 2015 by Waterfall Security Solutions 2015 "Secure" Access Behind lots

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to Health Information Risks vary based on the mobile device and its use. Some risks include:

More information

I.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000

I.T. Assurance. Letting you do what you do best... run your business. www.sironasolutions.com 0161 850 1000 Letting you do what you do best... run your business www.sironasolutions.com 06 850 000 For years, IT companies and their clients have been working against each other. Something breaks, the IT company

More information

JOB DESCRIPTION QUESTIONNAIRE FOR SUPPORT STAFF

JOB DESCRIPTION QUESTIONNAIRE FOR SUPPORT STAFF JOB DESCRIPTION QUESTIONNAIRE FOR SUPPORT STAFF JOB TITLE: REPORTS TO: Assistant Systems Administrator Technical Services Manager 1. PURPOSE OF THE JOB To support the delivery of IT services across the

More information

Bagggn knowledge and Technology - Free Online Tutorial

Bagggn knowledge and Technology - Free Online Tutorial Design for digital communica2on pla4orms E2013 Brian Everi< brev@itu.dk Signe Anne Atli Jeppe ssts@itu.dk acwf@itu.dk abka@itu.dk jepr@itu.dk Signe Stoholm Sørensen // DDK er og hjælpelærer Alle kan lære

More information

How To Protect A Smart Grid From Cyber Security Threats

How To Protect A Smart Grid From Cyber Security Threats Smart Grid Cyber Security System Reliability, Defense-in-Depth, Business Continuity, Change Management, Secure Telecommunications, Endpoint Protection, Identity Management, and Security Event Management

More information

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information. Mobile Devices: Risks to to Health Mobile Information Devices: Risks to Health Information Risks vary based on the

More information

SAP Best Practices. Færdigpakket branchespecifik og brancheovergribende knowhow. Tilgængelighed for SAP-kunder og SAP-partnere

SAP Best Practices. Færdigpakket branchespecifik og brancheovergribende knowhow. Tilgængelighed for SAP-kunder og SAP-partnere SAP Best Practices Færdigpakket branchespecifik og brancheovergribende knowhow Tilgængelighed for SAP-kunder og SAP-partnere 1. Tilgængelighed af SAP Best Practices 2. Download af SAP Best Practices Tilgængelighed

More information

DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK. Fall & Spring: Monday Thursday 8am to 9pm. Summer & Breaks:

DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK. Fall & Spring: Monday Thursday 8am to 9pm. Summer & Breaks: DECS Community IT Michigan State University College of Engineering DIVISION OF ENGINEERING COMPUTING SERVICES DECS SERVICE DESK For all questions and requests visit www.egr.msu.edu/decs or 1325EB, e mail

More information

RFID til håndtering af - bagage i Aalborg Lufthavn og - fiskekasser i danske fiskerihavne 16. marts 2011 Netværksmøde i ICTNORCOM

RFID til håndtering af - bagage i Aalborg Lufthavn og - fiskekasser i danske fiskerihavne 16. marts 2011 Netværksmøde i ICTNORCOM RFID til håndtering af - bagage i Aalborg Lufthavn og - fiskekasser i danske fiskerihavne 16. marts 2011 Netværksmøde i ICTNORCOM Indlægsholder: Keld Arenholt Christensen Back-up: Jørgen Albøge Hvem er

More information

6445A - Implementing and Administering Windows Small Business Server 2008

6445A - Implementing and Administering Windows Small Business Server 2008 6445A - Implementing and Administering Windows Small Business Server 2008 Course Number: 6445A Course Length: 5 Days Course Overview This 5 day course provides students with the necessary knowledge to

More information

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview

Are You in Control? MaaS360 Control Service. Services > Overview MaaS360 Control Overview Services > Overview MaaS360 Control Overview Control Over Endpoints Ensure that patches and security software on laptops and distributed PCs are always up to date. Restart applications automatically. Block

More information

MANAGED SERVICES ON DEMAND SERVICES BACKUP AND DISASTER RECOVERY CLOUD SERVICES HARDWARE AS A SERVICE. Exceed Best

MANAGED SERVICES ON DEMAND SERVICES BACKUP AND DISASTER RECOVERY CLOUD SERVICES HARDWARE AS A SERVICE. Exceed Best MANAGED SERVICES ON DEMAND SERVICES BACKUP AND DISASTER RECOVERY CLOUD SERVICES HARDWARE AS A SERVICE Avoid the capital investment required for maintaining and replacing your technology. Our Hardware as

More information

Print4 Solutions fully comply with all HIPAA regulations

Print4 Solutions fully comply with all HIPAA regulations HIPAA Compliance Print4 Solutions fully comply with all HIPAA regulations Print4 solutions do not access, store, process, monitor, or manage any patient information. Print4 manages and optimize printer

More information

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB

More information

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER 1 Agenda Audits Articles/Examples Classify Your Data IT Control

More information

Symphony Plus Cyber security for the power and water industries

Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries

More information

Operational Guidelines for Industrial Security

Operational Guidelines for Industrial Security Operational Guidelines for Industrial Security Proposals and recommendations for technical and organizational measures for secure operation of plant and machinery Version 2.0 Operational Guidelines for

More information

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business Qualification Specification Level 4 Certificate in Cyber Security and Intrusion For Business ProQual 2015 Contents Page Introduction 3 Qualification profile 3 Centre requirements 4 Support for candidates

More information

www.cadline.co.uk www.midastechnology.co.uk Page 1 of 5

www.cadline.co.uk www.midastechnology.co.uk Page 1 of 5 Page 1 of 5 Support Are you confident that you have all eventualities covered and that your current IT support provider can handle all of your issues? Are you frustrated with your application supplier

More information

Quick Installation Guide For Mac users

Quick Installation Guide For Mac users Quick Installation Guide For Mac users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service

Healthcare IT Compliance Service. Services > Overview MaaS360 Healthcare IT Compliance Service Services > Overview MaaS360 Ensure Technical Safeguards for EPHI are Working Monitor firewalls, anti-virus packages, data encryption solutions, VPN clients and other security applications to ensure that

More information

Information Security @ Blue Valley Schools FEBRUARY 2015

Information Security @ Blue Valley Schools FEBRUARY 2015 Information Security @ Blue Valley Schools FEBRUARY 2015 Student Data Privacy & Security Blue Valley is committed to providing an education beyond expectations to each of our students. To support that

More information

VoIP Survivor s s Guide

VoIP Survivor s s Guide VoIP Survivor s s Guide Can you really save $, improve operations, AND achieve greater security and availability? Presented by Peggy Gritt, Founder and CEO of the VoIP A non-biased organization for the

More information

How To Protect Your Data From Being Stolen

How To Protect Your Data From Being Stolen DATA SECURITY & PCI DSS COMPLIANCE PROTECTING CUSTOMER DATA WHAT IS PCI DSS? PAYMENT CARD INDUSTRY DATA SECURITY STANDARD A SET OF REQUIREMENTS FOR ANY ORGANIZATION OR MERCHANT THAT ACCEPTS, TRANSMITS

More information

RuggedCom Solutions for

RuggedCom Solutions for RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application

More information

Document ID. Cyber security for substation automation products and systems

Document ID. Cyber security for substation automation products and systems Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has

More information

Quick Installation Guide-For MAC users

Quick Installation Guide-For MAC users Quick Installation Guide-For MAC users Packing List 1) IP CAMERA X 1 2) Wi-Fi Antenna (only available for wireless model) 3) DC Power Supply X 1 4) Network Cable X 1 5) Mounting bracket 1 6) CD X 1 (Include

More information

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS

TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS TECHNICAL AUDITS FOR CERTIFYING EUROPEAN CITIZEN COLLECTION SYSTEMS Technical audits in accordance with Regulation 211/2011 of the European Union and according to Executional Regulation 1179/2011 of the

More information

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 The Internet of Things (IoT) and Industrial Networks Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 Increasingly Everything will be interconnected 50 Billion Smart Objects

More information

SharePoint Brugergruppe møde 15. august 2014

SharePoint Brugergruppe møde 15. august 2014 SharePoint Brugergruppe møde 15. august 2014 Konsulent i justb Underviser hos Orange Man Initiativtager til MsBIP Arbejdet med Microsoft BI i 7 år Stærkt fokus på front-end Analysis Services Reporting

More information

Business Continuity / Disaster Recovery in an IT infrastructure scenario

Business Continuity / Disaster Recovery in an IT infrastructure scenario Check List for Business Continuity / Disaster Recovery in an IT infrastructure scenario Amos Attar Business Development Manager Hannan IT Pty Ltd 61-63 Oxford Street Collingwood Vic 3066 PO Box 1943 Collingwood

More information

IT Security and OT Security. Understanding the Challenges

IT Security and OT Security. Understanding the Challenges IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control

More information

Konfigurering Netværk Sikkerhed brugen af IPSec.

Konfigurering Netværk Sikkerhed brugen af IPSec. Konfigurering Netværk Sikkerhed brugen af IPSec. Introduktion til IPSec. Implementering af IPSec. Konfigurering TCP/IP. Fejlsøgning. Introduktion til IPSec. Indeholder Identificere sikkerhedstrusler i

More information

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating to all users of UNH IT resources, and improve the availability

More information

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems Security Tool Kit System Checklist Departmental Servers and Enterprise Systems INSTRUCTIONS System documentation specifically related to security controls of departmental servers and enterprise systems

More information

Altius IT Policy Collection Compliance and Standards Matrix

Altius IT Policy Collection Compliance and Standards Matrix Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy

More information

When Your Networkʼs Down, Call Crown

When Your Networkʼs Down, Call Crown When Your Networkʼs Down, Call Crown 521 W. Broad Avenue Albany, GA 31701 Phone: 229.317.7940 Fax: 229.317.7941 HelpDesk@CrownNetworking.com MANAGED SERVICES & FLAT RATE I.T. SUPPORT Our Managed Services,

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006

Electronic Prescribing of Controlled Substances Technical Framework Panel. Mark Gingrich, RxHub LLC July 11, 2006 Electronic Prescribing of Controlled Substances Technical Framework Panel Mark Gingrich, RxHub LLC July 11, 2006 RxHub Overview Founded 2001 as nationwide, universal electronic information exchange Encompass

More information