Standardy w zarządzaniu bezpieczeństwem IT
|
|
|
- June Higgins
- 10 years ago
- Views:
Transcription
1 Dr Ryszard Kossowski Standardy w zarządzaniu bezpieczeństwem IT Przedsięwzięcie, w którym MUSIMY uwzględnić aspekt bezpieczeństwa. Jakie kroki powinniśmy podjąć? 1. Polityka bezpieczeństwa 2. Rozpoznanie zagroŝeń (najlepiej wszystkich) 3. Analiza ryzyka 4. Zaprojektowanie zabezpieczeń. Jak moŝemy podejść do projektu zabezpieczeń? 1. Projektować samemu 2. Kupić gotowe rozwiązania (lepiej ogłosić przetarg) 3. Przy kupowaniu wymagać certyfikatów Skąd się biorą certyfikaty? 1. Producent (hardware owego lub software owego) urządzenia korzysta ze znormalizowanych rozwiązań. Takie rozwiązania mogą być tańsze i spełniające wyŝsze wymagania aniŝeli rozwiązania własne 2. Producent zgłasza urządzenie do laboratorium uprawnionego do analizy i wydania certyfikatu uznawanego moŝliwie jak najszerzej 3. Laboratorium, w oparciu o sugestie producenta i znormalizowane kryteria, przeprowadza badania i ewentualnie wydaje certyfikat Godnym podkreślenia są następujące zalety takiego podejścia 1. ObniŜenie kosztów 2. Gwarancja najwyŝszej jakości według aktualnie znanej wiedzy 3. Kompatybilność i zamienność 4. Delegowanie odpowiedzialności na laboratorium wydające certyfikat Wymagania rynku e-commerce = Internet + Electronic Business + Security Techniques m-commerce = Internet + Mobility + Electronic Business + Security Techniques Standaryzowane techniki bezpieczeństwa zaczynają być obowiązkowymi wymaganiami w elektronicznym handlu, opiece zdrowotnej, i wielu innych obszarach zastosowań. Cztery globalne instytucje The International Electrotechnical Commission (IEC) The International Organization for Standardization (ISO) The International Telecommunication Union (ITU) The United Nations Economic Commission for Europe (UN/ECE) Instytucje standaryzacyjne działają w ramach międzynarodowego porozumienia IEC i ISO są rodzicami JTC1 w standardach IT
2 ISO, IEC i ITU kaŝda ma grupy techniczne opracowujące standardy dla e-business UN/ECE obejmuje równieŝ kraje z poza Europy, takie jak Kanada i USA UN/ECE jest rodzicem UN/CEFACT UN s Centre for Trade Facilitation and Electronic Business Zestawienie standardów INTERNATIONAL STANDARD ISO/IEC Information security management Part 1: Code of practice for information security management BS :2002 Information security management systems - Specification with guidance for use BS :2006 Information security management systems Part 3: Guidelines for information security risk management ISO/IEC Information technology Security techniques Management of information and communications technology security Part 1: Concepts and models for information and communications technology security management ISO/IEC 1st CD Information technology Security techniques Management of information and communications technology security Part 2: Information security risk management ISO/IEC TR , Information technology - Guidelines for the management of IT Security (GMITS) Part 3: Techniques for the management of IT Security ISO/IEC WD , Information technology - Security techniques - management of IT Security (GMITS) Part 4: Selection of safeguards Guidelines for the ISO/IEC PDTR Information technology Security techniques Guidelines for the management of IT security Part 5: Management guidance on network security INFORMATION SECURITY MANAGEMENT SYSTEMS The ISO/IEC information security management systems (ISMS) family of standards listed below has been developed to assist organizations, of all types and sizes, to implement and operate effective ISMS. ISO/IEC provides an overview and specifies the terminology for the ISO/IEC ISMS family of standards.
3 ISO/IEC specifies requirements for an information security management system where an organization needs to demonstrate its ability to protect information security assets and give confidence to interested parties. ISO/IEC provides implementation guidance that can be used when designing controls for achieving information security. ISO/IEC provides practical guidance for implementing an information security management system based on ISO/IEC ISO/IEC provides guidance and advice on the development and use of measurements in order to assess the effectiveness of ISMS, control objectives, and controls used to implement and manage information security, as specified in ISO/IEC ISO/IEC provides guidelines for an organization to define their approach to risk management to address the requirements in ISO/IEC ISO/IEC provides requirements for bodies providing audit and certification of information security management systems. ISO/IEC provides guidance on the principles of auditing, managing audit programmes, conducting quality management system audits and environmental management system audits, as well as guidance on the competence of quality and environmental management system auditors. ISO/IEC Information security management for intersector and interorganisational communications This International Standard is a specialist supplement to ISO/IEC and ISO/IEC for use by information sharing communities. The guidelines contained within this International Standard are in addition to and complement the implementation guidance given in the ISO/IEC family of standards. ISO/IEC provides an implementation baseline of ISM within telecommunications organizations to ensure the confidentiality, integrity and availability of telecommunications facilities and services. ISO/IEC Guidelines on the integrated implementation of ISO/IEC and ISO/IEC The relationship between information security and service management is so close that many organizations already recognize the benefits of adopting both sets of standards. It is common for an organization to adopt one standard, improve the way it operates to comply with the requirements of that standard, and then make further improvements to conform to the requirements of the other. There are a number of advantages in implementing an integrated management system which takes into account both the services provided, and the protection of information assets. These benefits can be experienced whether one standard is implemented before the other, or both standards are implemented simultaneously. Management and organizational processes, in particular, can derive benefit from the similarities between the standards and their common objectives. ISO/IEC Governance of information security This International Standard provides guidance on the governance of information security. The governing body, as part of its governance responsibilities, is increasingly required to oversee information security to ensure the objectives of the organization are achieved. ISO/IEC Information security management guidelines for financial services Continuous developments in information technology have led to an increased reliance by organizations providing financial services on their information processing assets. Consequently, management, customers and regulators have heightened expectations regarding effective information security protection of these assets and information.
4 ISO/IEC Information security management Organizational economics A successful information security management (ISM) requires a strongly integrated understanding of both the technical (i.e. balance of risk and security) and economic (i.e. balance of benefit and cost) approaches in all aspects of its inception, design, implementation, management, improvement, and retirement. Relying only on a technical approach through the use of controls (i.e. encryption, access and privilege management, firewalls and, intrusion and malicious code eradication) without the incorporation of an understanding as to the economic value supporting the technical approach will not always provide an appropriate level of protection to the information assets of an organization. Information security management needs to adopt a risk management approach whereby by both the technical and economic aspects are considered in unison. ISO/IEC provides business continuity management as an integral part of a holistic risk management process that safeguards the interests of an organization s key stakeholders, reputation, brand and value creating activities through: a) identifying potential threats that may cause adverse impacts on an organization s business operations, and associated risks; b) providing a framework for building resilience for business operations; c) providing capabilities, facilities, processes, action task lists, etc., for effective responses to disasters and failures. ISO/IEC Cybersecurity is the collection of tools, policies, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect organization and user s assets on the cyber environment. Organization and user s assets include connected computing devices, computing users, applications/services, communications systems, multimedia communication, and the totality of transmitted and/or stored information in the cyber environment. ISO/IEC consists of the following parts, under the general title Information technology Security techniques Network Security: Part 1: Overview and concepts, Part 2: Guidelines for the design and implementation of network security, Part 3: Reference networking scenarios Risks, design techniques and control issues, Part 4: Securing Communications between networks using security gateways - Risks, design techniques and control issues, Part 5: Securing communications across networks using Virtual Private Networks (VPNs) - Risks, design techniques and control issues, Part 6: IP convergence Part 7: Wireless ISO/IEC Security techniques Guidelines for cybersecurity This International Standard gives guidelines for stakeholders to establish baseline security practices for Cyberspace and provides a framework for information sharing, coordination and incident handling. ISO/IEC provides guidelines for application security - specify an application security life cycle, incorporating the security activities and controls for use as part of an application life cycle, covering applications developed through internal development, external acquisition, outsourcing/offshoring1, or a hybrid of these approaches. ISO/IEC provides the information and guidance for any organization to implement and maintain a quality approach for information security incident management. ISO/IEC 27036
5 ISO/IEC consists of the following parts, under the general title Information technology Security techniques Information security for supplier relationships. Part 1: Overview and concepts Part 2 Generic requirements [Co-editor s note: potential change of title not officially requested.] Part 3: ICT Supply Chain Security Part 4: Outsourcing [Co-editor s note: co-editor assignment to be determined.] Part 5: Cloud Computing [Co-editor s note: co-editor assignment to be determined.] Part 6: TBD [Co-editor s note: title and co-editor assignment to be determined.] This International Standard provides further detailed implementation guidance on the controls dealing with supplier relationships that are described as general recommendations in ISO/IEC ISO/IEC Security techniques Guidelines for identification, collection, acquisition and preservation of digital evidence This International Standard provides guidelines for specific activities in the handling of digital evidence, which are identification, collection, acquisition and preservation of digital data that may be of evidential value (i.e. potential digital evidence). These steps are required in an investigation process which is designed to maintain the integrity of the digital evidence an acceptable methodology in obtaining digital evidence will ensure its admissibility in meeting its purposes. ISO/IEC Security techniques -- Specification for digital redaction The redaction of born-digital documents is a relatively new area of document management practices, and raises unique issues and potential risks. Where electronic documents are redacted, removed information must not be recoverable. Hence, care needs to be taken so that redacted information remains hidden within non-displayable portions of bit streams. This international standard specifies methods for digital redaction of digital documents as well as a testing methodology for evaluating the functionality of these functions. ISO/IEC Storage security: provides further detailed implementation guidance on the storage security controls that are described at a basic standardized level in ISO/IEC The objectives for this international standard are to: help draw attention to the risks, assist organizations in better securing their data when stored, provide a basis for auditing storage security controls. ISO/IEC Security techniques Vulnerability disclosure A vulnerability is a weakness of software, hardware, or online service that can be exploited. Vulnerabilities can be caused by software and hardware design flaws, poor administrative processes, lack of awareness and education, and advancements in the state of the art or improvements to current practices. Regardless of cause, an exploitation of such vulnerabilities may result in real threats to mission-critical information systems. ISO/IEC Information technology -- Security techniques Vulnerability handling processes This International Standard describes processes to handle reports of potential vulnerabilities in products and online services. The audience for this standard includes consumers, developers, vendors, and evaluators of secure IT products.
6 ISO/IEC Information technology -- Security techniques A framework for access management An access management framework needs to establish the following components, which are critical to the success of an organization's access management solution: Access relationships that may be based on the identity of an entity in a context, or may be based on whether an entity meets other criteria (such as membership of a group of entities). Access management operations concerns establishment of such relationships and their types, including authenticating and monitoring the access, accountability, suspension (optional) and termination of the relationship itself. Enforcing organizational access policies by means of linking directly the main processes who users are (identification and authentication) and what users can do (authorization). The principles given in the OECD Guidelines for the Security of Information Systems and Networks [1] apply throughout the ISO/IEC ISMS family of standards. A short overview of these OECD principles is as follows: (1) Awareness of the need for information security. Świadomość potrzeby bezpieczeństwa informacji. (2) Responsibility assignment of information security. Przypisanie odpowiedzialności za bezpieczeństwo informacji. (3) Response to and detect information security incidents. Reagowanie aby zapobiegać i wykrywać incydenty bezpieczeństwa informacji. (4) Ethics respecting legitimate interests. Problemy etyczne uwzględniające prawne korzyści. (5) Democracy to ensure information security is compatible with society values. Demokracja dla zapewnienia, Ŝe bezpieczeństwo informacji daje się pogodzić z wartościami społeczeństwa (6) Risk Management providing levels of assurance towards acceptable risks. Zarządzanie Ryzykiem gwarantujące poziomy pewności względem akceptowalnych ryzyk. (7) Security design and implementation incorporated as an essential element. Projekt i implementacja włączone jako element zasadniczy. (8) Security management ensuring a comprehensive approach. Zarządzanie bezpieczeństwem zapewniające wszechstronne podejście. (9) Continuous improvement of information security. Ciągłe udoskonalanie bezpieczeństwa informacji. This International Standard is applicable to anyone interested in gaining a better understanding of the ISO/IEC ISMS family of standards.
7
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
An Overview of ISO/IEC 27000 family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder
JTC 1/SC 27Security Techniques - Översikt arbetsgrupper och standarder WG 1 Information security management systems WG 2 Cryptography and security mechanisms WG 3 Security evaulation criteria WG 4 Security
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
ISO/IEC Information & ICT Security and Governance Standards in practice. Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT
ISO/IEC Information & ICT Security and Governance Standards in practice Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT June 4, 2009 ISO and IEC ISO (the International Organization for Standardization)
CESG Certification of Cyber Security Training Courses
CESG Certification of Cyber Security Training Courses Supporting Assessment Criteria for the CESG Certified Training (CCT) Scheme Portions of this work are copyright The Institute of Information Security
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
ISO 27001: Information Security and the Road to Certification
ISO 27001: Information Security and the Road to Certification White paper Abstract An information security management system (ISMS) is an essential part of an organization s defense against cyberattacks
Safeguards Frameworks and Controls. Security Functions Parker, D. B. (1984). The Many Faces of Data Vulnerability. IEEE Spectrum, 21(5), 46-49.
Safeguards Frameworks and Controls Theory of Secure Information Systems Features: Safeguards and Controls Richard Baskerville T 1 F 1 O 1 T 2 F 2 O 2 T 3 F 3 O 3 T 4... T n...... F l O m T F O Security
Human Factors in Information Security
University of Oslo INF3510 Information Security Spring 2014 Workshop Questions Lecture 2: Security Management, Human Factors in Information Security QUESTION 1 Look at the list of standards in the ISO27000
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Il nuovo standard ISO 22301 sulla Business Continuity Scenari ed opportunità
Il nuovo standard ISO 22301 sulla Business Continuity Scenari ed opportunità Massimo Cacciotti Business Services Manager BSI Group Italia Agenda BSI: Introduction 1. Why we need BCM? 2. Benefits of BCM
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2
Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications
FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information
FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Our Commitment to Information Security
Our Commitment to Information Security What is HIPPA? Health Insurance Portability and Accountability Act 1996 The HIPAA Privacy regulations require health care providers and organizations, as well as
Information Security Guideline for NSW Government Part 1 Information Security Risk Management
Department of Commerce Guidelines Information Security Guideline for NSW Government Part 1 Information Security Risk Management Issue No: 3.2 First Published: Sept 1997 Current Version: Jun 2003 Table
Introduction to Cyber Security / Information Security
Introduction to Cyber Security / Information Security Syllabus for Introduction to Cyber Security / Information Security program * for students of University of Pune is given below. The program will be
This document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 27033-1 Second edition 2015-08-15 Information technology Security techniques Network security Part 1: Overview and concepts Technologies de l information Techniques de sécurité
Office of the Auditor General Performance Audit Report. Statewide Oracle Database Controls Department of Technology, Management, and Budget
Office of the Auditor General Performance Audit Report Statewide Oracle Database Controls Department of Technology, Management, and Budget March 2015 071-0565-14 State of Michigan Auditor General Doug
Altius IT Policy Collection Compliance and Standards Matrix
Governance IT Governance Policy Mergers and Acquisitions Policy Terms and Definitions Policy 164.308 12.4 12.5 EDM01 EDM02 EDM03 Information Security Privacy Policy Securing Information Systems Policy
Security Standards. 17.1 BS7799 and ISO17799
17 Security Standards Over the past 10 years security standards have come a long way from the original Rainbow Book series that was created by the US Department of Defense and used to define an information
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
ISO/IEC 27001:2013 webinar
ISO/IEC 27001:2013 webinar 11 June 2014 Dr. Mike Nash Gamma Secure Systems Limited UK Head of Delegation, ISO/IEC JTC 1/SC 27 Introducing ISO/IEC 27001:2013 and ISO/IEC 27002:2013 New versions of the Information
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
Third Party Security Requirements Policy
Overview This policy sets out the requirements expected of third parties to effectively protect BBC information. Audience Owner Contacts This policy applies to all third parties and staff, including contractors,
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014 Revision History Update this table every time a new edition of the document is
Western Australian Auditor General s Report. Information Systems Audit Report
Western Australian Auditor General s Report Information Systems Audit Report Report 10 June 2012 Auditor General s Overview The Information Systems Audit Report is tabled each year by my Office. It summarises
7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008
U.S. D EPARTMENT OF H OMELAND S ECURITY 7 Homeland Fiscal Year 2008 HOMELAND SECURITY GRANT PROGRAM ty Grant Program SUPPLEMENTAL RESOURCE: CYBER SECURITY GUIDANCE uidelines and Application Kit (October
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY
WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4
Domain 1 The Process of Auditing Information Systems
Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge
---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---
---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17
ICT Security Cybersecurity CYBEX Overview of activities in ITU-T with focus on Study Group 17 TSB Briefing to the Regional Offices, 28 Feb 2011 Martin Euchner Advisor of ITU-T Study Group 17 [email protected]
NHS Business Services Authority Information Security Policy
NHS Business Services Authority Information Security Policy NHS Business Services Authority Corporate Secretariat NHSBSAIS001 Issue Sheet Document reference NHSBSARM001 Document location F:\CEO\IGM\IS\BSA
University of Sunderland Business Assurance Information Security Policy
University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant
OCC 98-3 OCC BULLETIN
To: Chief Executive Officers and Chief Information Officers of all National Banks, General Managers of Federal Branches and Agencies, Deputy Comptrollers, Department and Division Heads, and Examining Personnel
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn
2008 by Bundesamt für Sicherheit in der Informationstechnik (BSI) Godesberger Allee 185-189, 53175 Bonn Contents Contents 1 Introduction 1.1 Version History 1.2 Objective 1.3 Target group 1.4 Application
Network & Information Security Policy
Policy Version: 2.1 Approved: 02/20/2015 Effective: 03/02/2015 Table of Contents I. Purpose................... 1 II. Scope.................... 1 III. Roles and Responsibilities............. 1 IV. Risk
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014. Straightforward Security and Compliance
3rd Party Assurance & Information Governance 2014-2016 outlook IIA Ireland Annual Conference 2014 Continuous Education Services (elearning/workshops) Compliance Management Portals Information Security
Information Security: Business Assurance Guidelines
Information Security: Business Assurance Guidelines The DTI drives our ambition of prosperity for all by working to create the best environment for business success in the UK. We help people and companies
Managing internet security
Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering
Cyber Controls : A Critical Discipline of Systems 14 th Annual NDIA Systems San Diego, CA October 24-28, 2011 Bharat Shah Lockheed Martin IS&GS [email protected] Purpose Provide an overview on integrating
Information security policy
Information security policy Issue sheet Document reference Document location Title Author Issued to Reason issued NHSBSARM001 S:\BSA\IGM\Mng IG\Developing Policy and Strategy\Develop or Review of IS Policy\Current
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
The new 27000 Family of Standards & ISO/IEC 27001
ISO/IEC 27000 Family of Standards by Dr. Angelika Plate 07-09 June 2011, Beirut, Lebanon June 2011 The new 27000 Family of Standards & ISO/IEC 27001 June 2011 ISO/IEC 27000 Family of Standards 2 The new
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA
INFORMATION SECURITY STANDARDS DEVELOPMENT IN MALAYSIA By THAIB MUSTAFA, CHAIRMAN TECHNICAL COMMITTEE FOR INFORMATION SECURITY (TC/G/5) INDUSTRY STANDARDS COMMITTEE FOR INFORMATION TECHNOLOGY, COMMUNICATION
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
www.pwc.com Third Party Risk Management 12 April 2012
www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
How To Manage Risk On A Scada System
Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document
Cybersecurity Framework: Current Status and Next Steps
Cybersecurity Framework: Current Status and Next Steps Federal Advisory Committee on Insurance November 6, 2014 Adam Sedgewick Senior IT Policy Advisor [email protected] National Institute of Standards
University Information Technology Security Program Standard
University Information Technology Security Program Standard July 2012 Version 3.0 This standard establishes requirements and general principles for initiating, implementing, maintaining, and improving
IBX Business Network Platform Information Security Controls. 2015-02- 20 Document Classification [Public]
IBX Business Network Platform Information Security Controls 2015-02- 20 Document Classification [Public] Table of Contents 1. General 2 2. Physical Security 2 3. Network Access Control 2 4. Operating System
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance
GUARDING YOUR BUSINESS BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance www.balabit.com In 2008, the Monetary Authority of Singapore (MAS),
NSW Government Digital Information Security Policy
NSW Government Digital Information Security Policy Version: 2.0 Date: April 2015 CONTENTS PART 1 PRELIMINARY... 3 1.1 Scope... 3 1.2 Application... 3 1.3 Objectives... 3 PART 2 POLICY STATEMENT... 4 Core
Four Top Emagined Security Services
Four Top Emagined Security Services. www.emagined.com Emagined Security offers a variety of Security Services designed to support growing security needs. This brochure highlights four key Emagined Security
TABLE OF CONTENTS INTRODUCTION... 1
TABLE OF CONTENTS INTRODUCTION... 1 Overview...1 Coordination with GLBA Section 501(b)...2 Security Objectives...2 Regulatory Guidance, Resources, and Standards...3 SECURITY PROCESS... 4 Overview...4 Governance...5
Cyber Essentials Scheme
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
AN OVERVIEW OF INFORMATION SECURITY STANDARDS
AN OVERVIEW OF INFORMATION SECURITY STANDARDS February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL
TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL Title: Computer and Network Security Policy Policy Number: 04.72.12 Effective Date: November 4, 2003 Issuing Authority: Office of the Vice President for
Basics of Internet Security
Basics of Internet Security Premraj Jeyaprakash About Technowave, Inc. Technowave is a strategic and technical consulting group focused on bringing processes and technology into line with organizational
NEW SCHEME FOR THE INFORMATION SECURITY MANAGEMENT WITH ISO 27001:2013
NEW SCHEME FOR THE INFORMATION SECURITY MANAGEMENT WITH ISO 27001:2013 INTRODUCTION The Organization s tendency to implement and certificate multiple Managements Systems that hold up and align theirs IT
Which cybersecurity standard is most relevant for a water utility?
Which cybersecurity standard is most relevant for a water utility? Don Dickinson 1 * 1 Don Dickinson, Phoenix Contact USA, 586 Fulling Mill Road, Middletown, Pennsylvania, USA, 17057 (*correspondence:
VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data
VISP Vendor Information Security Plan: A tool for IT and Institutions to evaluate third party vendor capacity and technology to protect research data 1 Table of Contents Executive Summary... 3 Template
Guidance for Addressing Cybersecurity in the Chemical Sector. Version 2.0 December 2004
Guidance for Addressing Cybersecurity in the Chemical Sector December 2004 Legal and Copyright Notice The Chemical Industry Data Exchange (CIDX) is a nonprofit corporation, incorporated in the State of
Procuring Penetration Testing Services
Procuring Penetration Testing Services Introduction Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat
AUD105-2nd Edition. Auditor s Guide to IT - 20 hours. Objectives
AUD105-2nd Edition Auditor s Guide to IT - 20 hours Objectives More and more, auditors are being called upon to assess the risks and evaluate the controls over computer information systems in all types
State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4
State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes
INFORMATION SYSTEMS. Revised: August 2013
Revised: August 2013 INFORMATION SYSTEMS In November 2011, The University of North Carolina Information Technology Security Council [ITSC] recommended the adoption of ISO/IEC 27002 Information technology
Cloud Security Trust Cisco to Protect Your Data
Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive
Business Continuity Policy
Business Continuity Policy St Mary Magdalene Academy V1.0 / September 2014 Document Control Document Details Document Title Document Type Business Continuity Policy Policy Version 2.0 Effective From 1st
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
