The Information Security Forum (ISF) and Information security for external suppliers: a common baseline. Gregory Nowak Principal Research Analyst
|
|
|
- Noreen Johnston
- 10 years ago
- Views:
Transcription
1 The Information Security Forum (ISF) and Information security for external suppliers: a common baseline Gregory Nowak Principal Research Analyst
2 What is the ISF? An international association of some 300 leading global organisations, which... addresses key issues in information risk management through research and collaboration develops practical tools and guidance is fully independent, not-for-profit organisation and driven by its Members promotes networking within its membership The leading, global authority on information security and information risk management 2
3 ISF Members Public administration and defence Arbeids- og velferdsetaten Bergen Kommune (The Municipality of Bergen) Centrelink Danish Tax and Customs Administration Department of Health & National Health Service Department of Social & Family Affairs Finnish Communications Regulatory Authority Finnish Tax Administration Foreign & Commonwealth Office GOVCERT.NL Government of Ontario Government of South Australia Government of Victoria HM Revenue and Customs Infocomm Development Authority of Singapore Manitoba Provincial Government Maritime Provinces National Institute of Standards and Technology National Patient Safety Agency National Policing Improvement Agency (NPIA) Norwegian Tax Administration Parliamentary Information Communications Technology RDW Region Hovedstaden Revenue Commissioners South African Revenue Service The Government of British Columbia 3
4 Geographical coverage The ISF currently has Members in Australia Belgium Canada Chile Denmark Faroe Islands Finland France Germany Greece India Ireland Italy Latvia Luxembourg Netherlands New Zealand Norway Saudi Arabia Serbia Singapore South Africa Spain Sweden Switzerland Turkey United Arab Emirates United Kingdom United States of America 4
5 Currently 31 ISF Members in the United States (ISC)² AAA Insurance Company Alcatel-Lucent Apollo Group Baxter Healthcare Corporation Bechtel Corporation Boeing Bristol-Myers Squibb Cargill Incorporated Citigroup Fidelity Information Systems Goldman Sachs & Co Guardian Life Insurance Company of America Honeywell International HP Enterprise Services ITT Corporation Kraft Foods Marsh & McLennan Companies, Inc. Microsoft Corporation National Institute of Standards and Technology Northrop Grumman Corporation Pemco Corporation Procter & Gamble Services Company RSA State Farm Mutual Automobile Insurance Company Sungard Data Systems, Inc. Towers Watson USAA Vanguard Verizon XL Group plc. 5
6 What services does the ISF provide?
7 ISF Services - an overview 1. ISF Developed Tools and Methodologies 2. ISF Research Programme 3. Knowledge and Information Exchange ISF 22 nd Annual World Congress September 2011 Berlin, Germany 4. ISF Annual World Congress, USF Chapter Meetings 7
8 The Standard of Good Practice for Information Security
9 Specialist Tools The ISF's specialist tools are the result of research projects covering specific challenges in information security. Tools available include: Continuous Benchmarking Service Security and Legislation Database Third party security assessment tool (TPSAT) Security Function Diagnostic Return on Security Investment Calculator (ROSI) Best Practices in Endpoint Security Checklist Information Risk Analysis Methodology Risk Analyst Workbench 9
10 Research & reports over the past 12 months Solving the data privacy puzzle Reporting information risk Network convergence Protecting information in the end user environment Threat Horizon 2012 Information security assurance Security audit of business applications Information security maturity modelling Information security governance Information security principles The information lifecycle Information security for external suppliers Beyond the clear desk policy Benchmark reports: Critical Business Applications The impact of information security investment Consolidated benchmark results Cross reference to ISO/IEC 27002, CObIT version
11 The 2011 work programme (Q1) Workshop-based research and development projects: Cloud computing Avoiding the seven deadly sins (End Jan) Organisational Governance (End June) Research based projects: Consumerisation: Securing the next generation of end user environment (End March) Threat Horizon 2013 (End Feb) Standard of Good Practice update (End May) Information risk management tools: Information Risk Analysis Methodology - Risk Analyst s Workbench v1.0 (Ongoing) Briefing Papers: Cyber citizenship (End March) Training workshops: Information Risk Analysis Methodology (IRAM) Protecting information in the end user environment Security audit of business applications 11
12 Agenda The project The need for a standard Baseline security controls ISF and ISO: way forward Wrap-up 12
13 Previous ISF work Major area of interest: Managing third party access Securing remote access Managing information risks from outsourcing Information risk management in outsourcing and offshoring Information security in third party relationship management 13 13
14 No longer third parties external suppliers THIRD PARTIES A confusing term Difficult to explain Has particular legal meanings Poorly defined EXTERNAL SUPPLIERS Easier to define No legal meaning Aligns our terminology with other organisations An organisation that provides goods or services to an acquiring organisation. 14
15 Deliverables Executive overview ISF report Two ISO draft standards - Purchasing organisation - Third party organisation External Supplier baseline maturity assessment tools Data analysis pack 15
16 The need for a standard There are many out there: - Outsourcing standards (IAOP OSP v8.0, Healthcheck) - Security Standards (SOGP, ISO 2700X series, BITS SIG) - IT Standards (COBIT, ITIL, ISO 20000) - Other standards (ISO 28000, ISO / ISO 27031) - Auditing standards (SAS 70, ISAE 3402) Many of these standards: - Address different topics at different levels of detail - Are written independently of others - Offer differing certification or accreditation procedures Some standards: - Offer lists of controls others provide no controls - Controls may not be mandatory 16
17 BASELINE SECURITY CONTROLS 17
18 High-level control areas to be covered: % agreeing High-level control areas inf ormation and systems access identity and access management incident management inf ormation security policy monitoring inf ormation security governance f ramework business continuity personally identif iable inf ormation physical access malware protection inf ormation risk analysis change management electronic communication ownership network management education / training / awareness cryptographic solutions conf iguration management system development inf ormation validation hardware and sof tware procurement 45% 95% 93% 92% 92% 91% 90% 90% 90% 89% 87% 87% 85% 84% 83% 83% 83% 80% 79% 76% 71% 0% 20% 40% 60% 80% 100% % Agreeing 18
19 Information security baseline arrangements Based on ISF Standard of Good Practice Based on the 21 Guidelines for Information Security - Aligned with the Benchmark Eleven specific controls highlighted - Identified by Members Mandatory for all external suppliers Domains 1. Governance, Risk and Compliance 2. System management 3. Access management 4. System monitoring and response 5. Network connectivity 6. Electronic communication 7. Business control 8. Development 19
20 Coverage by domain Domain Governance, Risk and Compliance System management Access management Security monitoring and response Electronic communications Business control System development Baseline information security arrangement Information security framework Information security policy Awareness / education Information risk management Accountability / ownership Robust resilient design Purchase of hardware and software Configuration and security settings Input / process / output validation Physical protection Identity and access management Access control Continuous monitoring of systems and networks Change management Malware protection Incident management Protection of electronic communications Use of cryptographic solutions Business continuity External supplier management System Development Life Cycle methodology 20
21 Coverage by domain Domain Governance, Risk and Compliance System management Access management Security monitoring and response Network Connections Business control Baseline information security arrangement Identification and protection of information that is commercial, sensitive, regulated or personal in nature Separation of primary functions Separation of client databases / data sets Control of portable storage devices Privileged user management Segregation of duties Patch management e-discovery, e-forensic audit and trail of evidence creation Network security Control of network access / connectivity Security audit and review 21
22 And there s a maturity model The baseline arrangements are described against five categories Non-existent Initial or ad-hoc Repeatable Managed Optimised Acquirers can specify external supplier maturity against this model Non-existent not shown it s blank! 22
23 Baseline maturity assessment tool Provides an easy to use tool Lists the baseline information security arrangements and provides descriptions of the maturity levels Acquirers and external suppliers can measure maturity 23
24 External suppliers and the baseline arrangements Designed to be adopted in full by external supplier organisations Demonstrates commitment to information security Reduces the overall complexity of information security Allows the focused deployment of resources. Benefits: - Reduce negotiation required to set information security - focus on meeting the acquiring organisation s additional requirements - demonstrate their maturity to acquiring organisations - offer different levels of information security, based on the maturity required by the acquiring organisation. 24
25 ISF AND ISO: THE WAY FORWARD 25
26 ISO SC 27: Berlin October 2010 Body charged with creating and maintaining ISO 270XX series ISF has liaison status with WG1 so can: - Comment on drafts - Submit changes, new ideas - Work with national bodies ISF proposed that the results of this should become an ISO standard Very high interest Other projects in progress eg Outsourcing and supply chain, ISO
27 Outcomes from Berlin (1) Great support for the ISF proposal for a standard on third party relationships For legal reasons the term third party has been changed to external suppliers A new multi-part standard will be introduced, called Information security for supplier relationships Common elements based on the ISF proposal - distinctly separate parts for ICT supply chain and outsourcing. New ISO / IEC standard for information security in supplier relationships 27
28 Outcomes from Berlin (2) The existing working draft standard on outsourcing (ISO / IEC 27036) will be absorbed by this new standard, but number retained - Allows progress to be made more quickly ISO keen to have ISF onboard (allowing for their internal rules), which is very encouraging Will require on-going ISF resources, and ISF to gain liaison status category C for SC27 WG4, as well as WG1 (already formally applied) New ISO / IEC standard for information security in supplier relationships: ISF will have opportunity to shape 28
29 Potential form and content of the new standard The ISF work may form the core / majority of these parts Part 1: Overview and Concepts Part 2: Common requirements The baseline information security arrangements would be placed here Specialised standards, for example Part 3: ICT Supply Chain Part 4: Outsourcing Further parts may be added eg cloud computing 29
30 Thanks! Information Security Forum 30
Securing external suppliers and supply chains: the ISF approach
Securing external suppliers and supply chains: the ISF Dr. Adrian Davis, MBCS, CITP, CISMP Principal Research Analyst Information Security Forum Agenda Introduction The supply chain: business environment
How To Manage An Ip Telephony Service For A Business
Enabling organisations to focus on core revenue generating activities Your business needs reliable, flexible and secure communication tools to enable better connectivity and collaboration with your employees,
Foreign Taxes Paid and Foreign Source Income INTECH Global Income Managed Volatility Fund
Income INTECH Global Income Managed Volatility Fund Australia 0.0066 0.0375 Austria 0.0045 0.0014 Belgium 0.0461 0.0138 Bermuda 0.0000 0.0059 Canada 0.0919 0.0275 Cayman Islands 0.0000 0.0044 China 0.0000
Consulting and Professional Services. Strategic, architectural, operational and implementation expertise
Consulting and Professional Services Strategic, architectural, operational and implementation expertise How do you ensure the seamless integration of new and existing technologies and services not just
Contact Centre Integration Assessment
Contact Centre Integration Assessment How well are your business objectives aligned with the right contact centre technologies? Knowing how the technology in your contact centre supports service delivery
Microsoft Dynamics AX Update and Roadmap James Page & Guy Orridge. 10 August 2011
Microsoft Dynamics AX Update and Roadmap James Page & Guy Orridge 10 August 2011 Agenda General Availability for Dynamics AX 2012 Themes for Dynamics AX 2012 Roadmap Summary of Investments in Functional
Reporting practices for domestic and total debt securities
Last updated: 4 September 2015 Reporting practices for domestic and total debt securities While the BIS debt securities statistics are in principle harmonised with the recommendations in the Handbook on
Governance, Risk and Compliance Assessment
Governance, Risk and Compliance Assessment Information security is a pervasive business requirement and one that no organisation can afford to get wrong. If it s not handled properly, your business could
HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS
8 10 March 2016 Farnborough, Hampshire Dedicated CYBER ZONE! HOME OFFICE EVENT FOR SECURITY & POLICE PROFESSIONALS Key theme for 2016: Transformational Change POLICING & COUNTER TERRORISM CRITICAL NATIONAL
ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT
2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of
TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS. Paulo Magina Public Sector Integrity Division
TOWARDS PUBLIC PROCUREMENT KEY PERFORMANCE INDICATORS Paulo Magina Public Sector Integrity Division 10 th Public Procurement Knowledge Exchange Platform Istanbul, May 2014 The Organization for Economic
Brochure More information from http://www.researchandmarkets.com/reports/1339929/
Brochure More information from http://www.researchandmarkets.com/reports/1339929/ The 2011 World Forecasts of Machine Tools That Remove Material by Laser or Light, Photon, Ultrasonic, Electro-Discharge,
best practice guide 7 Best Practices to Make Telecom Expense Management Work for Your Business
best practice guide 7 Best Practices to Make Telecom Expense Management Work for Your Business With a global economy that remains under pressure, organisations around the world are looking for reliable
Enterprise Mobility Suite (EMS) Overview
Enterprise Mobility Suite (EMS) Overview Industry trends driving IT pressures Devices Apps Big data Cloud 52% of information workers across 17 countries report using 3+ devices for work Enable my employees
How many students study abroad and where do they go?
From: Education at a Glance 2012 Highlights Access the complete publication at: http://dx.doi.org/10.1787/eag_highlights-2012-en How many students study abroad and where do they go? Please cite this chapter
IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD
IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD A NEW IEC STANDARD FOR CYBERSECURITY FOR NUCLEAR POWER PLANTS: IEC 62645 - REQUIREMENTS FOR SECURITY PROGRAMS FOR COMPUTER-BASED
41 T Korea, Rep. 52.3. 42 T Netherlands 51.4. 43 T Japan 51.1. 44 E Bulgaria 51.1. 45 T Argentina 50.8. 46 T Czech Republic 50.4. 47 T Greece 50.
Overall Results Climate Change Performance Index 2012 Table 1 Rank Country Score** Partial Score Tendency Trend Level Policy 1* Rank Country Score** Partial Score Tendency Trend Level Policy 21 - Egypt***
Status of the ISO 55000 Asset Management System Standard
Status of the ISO 55000 Asset Management System Standard Michael E. Poland, CMRP Board Member, ANSI Corporate Member, IAM Director of Asset Management, Life Cycle Engineering ISO 55000 Asset Management
How do you manage the brain of the business in a way that supports the opportunities your organisation wants to take advantage of?
As the world becomes a more competitive place, businesses need to respond at lightning speed to take advantage of new opportunities or avoid risks. To enable this, the data centre needs to be a dynamic
Privileged user management
Privileged user management vv It s time to take control Bob Tarzey, Analyst and Director, Quocirca Ltd Introduction The data presented is based on 270 telephone interviews with organisations across Europe
HP Priority Services - Overview
HP Priority Services - Overview Premium enterprise-level global support for your entire Install base. May 2016 1 Overview Priority Services: Premium enterprise-level global support for your entire Install
3D Workspace: a new dimension to your desktop
3D Workspace: a new dimension to your desktop The desktop management landscape has changed As the world of work changes, so do the mechanics of IT management and delivery. Technology advances like virtualised
Global Effective Tax Rates
www.pwc.com/us/nes Global s Global s April 14, 2011 This document has been prepared pursuant to an engagement between PwC and its Client. As to all other parties, it is for general information purposes
Cloud Readiness Consulting Services
Cloud Readiness Consulting Services Globalisation and economic pressures are changing the business landscape, increasing the pressure to expedite time-to-market with new products and services, while keeping
DIRECT MARKETING STRATEGY. Web & Software Development Services
DIRECT MARKETING STRATEGY Web & Software Development Services Document created by : Rakesh Negi Business Development & Market Research Consultant New Delhi, India Skype: rakesh_negi1 MSN: [email protected]
World Consumer Income and Expenditure Patterns
World Consumer Income and Expenditure Patterns 2014 14th edi tion Euromonitor International Ltd. 60-61 Britton Street, EC1M 5UX TableTypeID: 30010; ITtableID: 22914 Income Algeria Income Algeria Income
The Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost *
The Role of Banks in Global Mergers and Acquisitions by James R. Barth, Triphon Phumiwasana, and Keven Yost * There has been substantial consolidation among firms in many industries in countries around
IP Trading Solutions
In many mature financial organisations, middle-and back-office functions already collaborate via high-quality, well-integrated voice and video traffic. Their trading floors, on the other hand, still operate
Cloud Readiness Workshop
Globalisation and economic pressures are changing the business landscape, increasing the pressure to expedite time-to-market with new products and services, while keeping costs down. In addition, for many
Consolidated International Banking Statistics in Japan
Total (Transfer Consolidated cross-border claims in all currencies and local claims in non-local currencies Up to and including one year Maturities Over one year up to two years Over two years Public Sector
GfK PURCHASING POWER INTERNATIONAL
GfK PURCHASING POWER INTERNATIONAL 1 Agenda 1. Europe 3 2. Americas 45 3. Asia & Near East 54 4. Afrika 66 5. Australia 68 6. Overview of countries and available levels 70 2 2 EUROPE 4 GfK
DSV Air & Sea, Inc. Aerospace Sector. DSV Air & Sea, Inc. Aerospace
DSV Air & Sea, Inc. Aerospace Sector DSV Air & Sea, Inc. Aerospace Introduction to DSV DSV is a global supplier of transport and logistics services. We have offices in more than 70 countries and an international
Cisco Smart Care Service
Q. What is Cisco Smart Care Service? A. Cisco Smart Care Service is a collaborative, comprehensive network wide service that enables your partner to deliver proactive network monitoring, health checkups,
MALTA TRADING COMPANIES IN MALTA
MALTA TRADING COMPANIES IN MALTA Trading companies in Malta 1. An effective jurisdiction for international trading operations 410.000 MALTA GMT +1 Located in the heart of the Mediterranean, Malta has always
Common Criteria Evaluations for the Biometrics Industry
Common Criteria Evaluations for the Biometrics Industry Kathy Malnick Senior Manager Criterian Independent Labs An initiative of the WVHTC Foundation Presentation outline Common Criteria defined Common
How does a venture capitalist appraise investment opportunities?
1 How does a venture capitalist appraise investment opportunities? Michael Queen - Finance Director, 3i Group plc A presentation to: 23 Pensions Convention 2 June 23 A How presentation does a venture to:
The rise of the cross-border transaction. Grant Thornton International Business Report 2013
The rise of the cross-border transaction Grant Thornton International Business Report 2013 Foreword MIKE HUGHES GLOBAL SERVICE LINE LEADER MERGERS & ACQUISITIONS GRANT THORNTON INTERNATIONAL LTD When reflecting
2011 ICT Facts and Figures
The World in 211 ICT Facts and Figures One third of the world s population is online 45% of Internet users below the age of 25 Share of Internet users in the total population Users, developed Using Internet:
The VAT & Invoicing Requirements Update March 2012
The VAT & Invoicing Requirements Update March 2012 Indirect taxes are a massive potential expense. For buyers and sellers of goods and services, how invoices are prepared and processed can affect a company's
opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive
opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive Contents Introduction 01 Having the cake and eating it 01 Holistic = end to end 01 The devil is in the detail
International Organization for Standardization TC 215 Health Informatics. Audrey Dickerson, RN MS ISO/TC 215 Secretary
International Organization for Standardization TC 215 Health Informatics Audrey Dickerson, RN MS ISO/TC 215 Secretary 1 Topics Introduction to ISO TC 215, Health Informatics Definitions Structure Membership
The Perks of Doing Business in Malta
The Perks of Doing Business in Malta Legal and Tax Opportunities Dr Charles Cassar CCLex.com Malta London 1 2012 2013 - CCLex.com Overview About the Firm Business Environment Legal basics Tax Considerations
Emerging Trends and The Role of Standards in Future Health Systems. Nation-wide Healthcare Standards Adoption: Working Groups and Localization
HL7 Pakistan 1 st Workshop Emerging Trends and The Role of Standards in Future Health Systems Nation-wide Healthcare Standards Adoption: Working Groups and Localization Mr. Muhammad Afzal (HL7 V3 RIM Certified
CISCO METRO ETHERNET SERVICES AND SUPPORT
SERVICES OVERIVEW CISCO METRO ETHERNET SERVICES AND SUPPORT In the ever-changing communications market, incumbent service providers are looking for ways to grow revenue. One method is to deploy service
SunGard Best Practice Guide
SunGard Best Practice Guide What Number Should I Use? www.intercalleurope.com Information Hotline 0871 7000 170 +44 (0)1452 546742 [email protected] Reservations 0870 043 4167 +44 (0)1452
World Leasing Yearbook 2016
Brochure More information from http://www.researchandmarkets.com/reports/3687603/ World Leasing Yearbook 2016 Description: The 2016 edition provides valuable reference data for all players in the field,
Flexible Cloud Services to Compete
white paper Service Providers Need Flexible Cloud Services to Compete Enterprise Customers Demand Flexible Cloud Solutions When the concept of cloud services first came about, there was a great deal of
The 2011 Standard of Good Practice for Information Security. June 2011
The 2011 Standard of Good Practice for Information Security June 2011 Published by Information Security Forum Limited Tel: +44 (0)20 7213 1745 Fax: +44 (0)20 7213 4813 Email: [email protected] Web:
European Organization for Security (EOS) - Description and Envisaged Activities for 2012
European Organization for Security (EOS) - Description and Envisaged Activities for 2012 EOS Objectives and Activities EOS is a tool for European security stakeholders for the comprehensive implementation
INSITE. Dimension Data s monitoring offering
Dimension Data s offering What s on your mind? Is your infrastructure management strategy optimal? Are you achieving optimum ROI on your infrastructure management investment? Are you employing the latest
BT Premium Event Call and Web Rate Card
BT Managed Event and BT Self-Managed Event (also referred to as Express, Plus and Premium) Conference Bridge and Call for Booked Audio Conferencing Services will comprise the following for each phone-conference:
The Value of Information Security Certifications
The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials
We decided that we would build IFS Applications on standards so our customers would not be locked into any particular technology. We still do.
IFS Applications for Shipbuilding 2 ifs shipbuilding OUR SOLUTION S DNA When we first set out to create IFS Applications over 25 years ago, our goal was to make the most usable business solution on the
AVANTGARD Private Cloud and Managed Services
AVANTGARD Private Cloud and Managed Services AVANTGARD PRIVATE CLOUD AND MANAGED SERVICES SunGard meets its customers diverse set of requirements by not only bringing to market scalable, flexible, and
SUPPLEMENTAL EXECUTIVE RETIREMENT PLANS IN CANADA
HEALTH WEALTH CAREER SUPPLEMENTAL EXECUTIVE RETIREMENT PLANS IN CANADA KEY FINDINGS FROM THE MERCER SERP DATABASE (2014 UPDATE) APRIL 2015 b CONTENTS 1. Introduction...2 2. Highlights of the Mercer SERP
The value of accredited certification
Certified Once Accepted Everywhere The value of accredited certification Survey Report Published May 212 In 21/11, the IAF carried out a global survey to capture market feedback on the value of certification.
How To Calculate Tertiary Type A Graduation Rate
Indicator How Many Students Finish Tertiary Education? Based on current patterns of graduation, it is estimated that an average of 46% of today s women and 31% of today s men in OECD countries will complete
360 o View of. Global Immigration
360 o View of Global Immigration In a fast moving global economy, remaining compliant with immigration laws, being informed and in control is more challenging than ever before. We are a globally linked
Appendix 1: Full Country Rankings
Appendix 1: Full Country Rankings Below please find the complete rankings of all 75 markets considered in the analysis. Rankings are broken into overall rankings and subsector rankings. Overall Renewable
MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries
IOSCO/MR/54/2015 Madrid, 22 December 2015 IOSCO reports on business continuity plans for trading venues and intermediaries The Board of the (IOSCO) today published two reports that seek to enhance the
EMEA BENEFITS BENCHMARKING OFFERING
EMEA BENEFITS BENCHMARKING OFFERING COVERED COUNTRIES SWEDEN FINLAND NORWAY ESTONIA R U S S I A DENMARK LITHUANIA LATVIA IRELAND PORTUGAL U. K. NETHERLANDS POLAND BELARUS GERMANY BELGIUM CZECH REP. UKRAINE
Global Dialing Comment. Telephone Type. AT&T Direct Number. Access Type. Dial-In Number. Country. Albania Toll-Free 00-800-0010 888-426-6840
Below is a list of Global Access Numbers, in order by country. If a Country has an AT&T Direct Number, the audio conference requires two-stage dialing. First, dial the AT&T Direct Number. Second, dial
Electronic Citizen Identities and Strong Authentication
Electronic Citizen Identities and Strong Authentication Sanna Suoranta, Lari Haataja, Tuomas Aura Department of Computer Science Aalto University Finland Sanna Suoranta [email protected] Content
opinion piece Eight Simple Steps to Effective Software Asset Management
opinion piece Eight Simple Steps to Effective Software Asset Management Contents Step 1: Collate your licence agreements 01 Step 2: Determine your actual licence position 01 Step 3: Understand your existing
INTERNATIONAL OVERVIEW John Wilkinson SVP Sales & Products
INTERNATIONAL OVERVIEW John Wilkinson SVP Sales & Products DE- C I X N G N L A U N C H E V E N T 2 Introduction XConnect provides secure, managed ENUM Registries and SIP based peering services to enable
Dimension Data s Uptime Maintenance Service
Dimension Data s Uptime Maintenance Service The pace of business today simply doesn t allow for downtime. When systems go off-line, productivity drops, time and money go to waste and opportunities are
Cloud Services for Microsoft
The success of your business depends on your ability to adapt to a dynamic market environment, where globalisation and economic pressures are reshaping the landscape. To remain competitive, your organisation
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Know the Facts. Aon Hewitt Country Profiles can help: Support a decision to establish or not establish operations in a specific country.
Aon Hewitt Country Profiles Your eguide to employment requirements and practices Profiles for nearly 90 countries worldwide Risk. Reinsurance. Human Resources. Know the Facts Whether you are a newcomer
2015 Growth in data center employment continues but the workforce is changing
Published in Conjunction with MARKET BRIEFING GLOBAL DATA CENTER EMPLOYMENT 2015 2015 Growth in data center employment continues but the workforce is changing Globally, the number of people working in
Cisco Conference Connection
Data Sheet Cisco Conference Connection Cisco IP Communications a comprehensive system of powerful, enterprise-class solutions including IP telephony, unified communications, IP video/audio conferencing,
Agenda. Company Platform Customers Partners Competitive Analysis
KidoZen Overview Agenda Company Platform Customers Partners Competitive Analysis Our Vision Power the backend of the post- web enterprise Key Challenges of the Mobile Enterprise Enterprise systems integration
Higher education institutions as places to integrate individual lifelong learning strategies
Higher education institutions as places to integrate individual lifelong learning strategies Andrzej Krasniewski Warsaw University of Technology Bologna Expert QUALIFICATIONS FRAMEWORKS AS INSTRUMENTS
Guidelines for Applicants: Advanced Training Course
Emerging Security Challenges Division Guidelines for Applicants: Advanced Training Course Introduction The NATO (SPS) seeks to enhance cooperation and dialogue with all partners through civil science and
IBM Global Services. IBM Maintenance Services managed maintenance solution for Cisco products
IBM Maintenance Services managed maintenance solution for Cisco products agenda The challenges of business connection The IBM/Cisco strategic alliance Introducing IBM Maintenance Services managed maintenance
Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features
Data Sheet Cisco IOS Public-Key Infrastructure: Deployment Benefits and Features Introduction to Public Key Infrastructure Public Key Infrastructure (PKI) offers a scalable method of securing networks,
HP Technology Services HP NonStop Server Support
Reference guide HP Technology Services HP NonStop Server Support HP Global NonStop Solution Center (GNSC) Table of contents Global NonStop Solution Center... 2 Product support for HP NonStop and Neoview
Dimension Data s Uptime Support Service
Dimension Data s Uptime Support Service As more technology enters the world, and is introduced into organisations, the typical IT environment increases in complexity. Businesses require higher levels of
Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276
Information Security Standards by Dr. David Brewer Gamma Secure Systems Limited Diamond House, 149 Frimley Road Camberley, Surrey, GU15 2PS +44 1276 702500 [email protected] Agenda Background and
MERCER S COMPENSATION ANALYSIS AND REVIEW SYSTEM AN ONLINE TOOL DESIGNED TO TAKE THE WORK OUT OF YOUR COMPENSATION REVIEW PROCESS
MERCER S COMPENSATION ANALYSIS AND REVIEW SYSTEM AN ONLINE TOOL DESIGNED TO TAKE THE WORK OUT OF YOUR COMPENSATION REVIEW PROCESS MERCER S COMPENSATION ANALYSIS AND REVIEW SYSTEM www.imercer.com/cars Mercer
Prevalence and Characteristics of School Psychology Preparation Programs Around the World
Prevalence and Characteristics of School Psychology Preparation Programs Around the World UNIVERSITY OF CALIFORNIA, SANTA BARBARA The School Psychology International Survey 2008 (SPIS) included questions
Integrating the Healthcare Enterprise (IHE): Enable Seamless and Secure Access to Health Information. IHE Europe Peter Mildenberger (User Co Chair)
Integrating the Healthcare Enterprise (IHE): Enable Seamless and Secure Access to Health Information IHE Europe Peter Mildenberger (User Co Chair) Real World (outside Healthcare) Use Cases in Healthcare
Measurements and indicators for healthcare IT. Leif Panduro Jensen, MD, MHM Director of Centre, Rigshospitalet, Copenhagen, DK
Measurements and indicators for healthcare IT Leif Panduro Jensen, MD, MHM Director of Centre, Rigshospitalet, Copenhagen, DK Measurements and indicators for healthcare IT Working group from January to
Hybrid Wide-Area Network Application-centric, agile and end-to-end
Hybrid Wide-Area Network Application-centric, agile and end-to-end How do you close the gap between the demands on your network and your capabilities? Wide-area networks, by their nature, connect geographically
Hemmersbach Company of chances
Hemmersbach Company of chances Kacper Kowalczyk Róża Jóda Edyta Kosińska Date: 2016-02-03 Version 3.0 BUSINESS MODEL Hemmersbachis specialized in cross-border infrastructural services for the information
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
MAUVE GROUP GLOBAL EMPLOYMENT SOLUTIONS PORTFOLIO
MAUVE GROUP GLOBAL SOLUTIONS PORTFOLIO At Mauve Group, we offer a variety of complete employee management services such as Global Employment Solutions (GES), Professional Employment Outsourcing (PEO),
The big pay turnaround: Eurozone recovering, emerging markets falter in 2015
The big pay turnaround: Eurozone recovering, emerging markets falter in 2015 Global salary rises up compared to last year But workers in key emerging markets will experience real wage cuts Increase in
best practice guide The Three Pillars of a Secure Hybrid Cloud Environment
best practice guide The Three Pillars of a Secure Hybrid Cloud Environment best practice guide The Three Pillars of a Secure Hybrid Cloud Environment Introduction How sound risk management, transparency
IFI 2011-2013 SPONSOR & PARTNER OPPORTUNITIES CELEBRATING 50 YEARS
IFI 2011-2013 SPONSOR & PARTNER OPPORTUNITIES CELEBRATING 50 YEARS IFI practice. The International Federation of Interior Architects/ Designers (IFI) is the global voice and authority for professionals
