Informa4on Security Management at Cer4ficate Authori4es
|
|
|
- Corey Bailey
- 10 years ago
- Views:
Transcription
1 Informa4on Security Management at Cer4ficate Authori4es István Zsolt BERTA Public Key Cryptographic Primi4ves 1
2 PKI lectures 1. Public key cryptography primiaves 2. CerAficates, CerAficate AuthoriAes, CerAficaAon Paths 3. Electronic signatures: signature creaaon & validaaon 4. Informa4on security management at CAs 5. PKI Business 2 2
3 Informa4on Security Management Risk Assessment InformaAon Security Management InformaAon Security a CerAficate Authority 3 3
4 Risk Assessment Public InfoSec Key Cryptographic Management CAs 4
5 How to be secure in the middle of Africa? source 5 5
6 Step 1: Define Assets The first step is to define the assets we would like to protect Not only financials and tangible objects, can be assets Examples: InformaAon, good reputaaon, trust, etc. In this example, we would just like to stay alive We have one asset: Our Life 6 6
7 Step 2: Iden4fy Threats List what you are afraid of Try to make general categories Lions Bandits Zebras Rain Mosquitoes Earthquakes Elephants Snakes 7 7
8 Risk More things can happen than will happen We try to deal with uncertainty by assessing 1) how like is that an even will occur and 2) what impact can it have upon us Risk = Likelihood x Impact In (informaaon) security we usually deal with risk that have negaave impact 8 8
9 Step 3: Assess likelihood and impact Threat Likelihood Impact Lions low/medium high Bandits low/medium medium/high Zebras low low Rain high low Mosquitoes high high/medium Earthquakes low medium Elephants low medium Snakes low high 9 9
10 Decide which threats to focus on Low Impact Med Impact High Impact Low Likelihood Zebras Earthquakes Elephant Snakes Lions Med Likelihood Bandits High Likelihood Rain Mosquitoes 10 10
11 Prac4cal notes A generic risk assessment considering all possible threats for all different areas is almost never pracacal; one rarely sees such a matrix of everything keeping it up- to- date requires a vast amount of resources it will always be very- very subjecave; risks from different areas are extremely hard to compare Both likelihood and impact can be very hard to determine lack of experience, lack of data subjecave black swans SAll, an organizaaon must make decisions on where to allocate its resources 11 11
12 What can you do with a risk? 1. MiAgate via controls/countermeasures (eliminate if possible) 2. Accept the risk because there is no way to miagate it because it is not feasible to miagate it because we have no resources for it because there is no point in miagaang it 12 12
13 Step 4: Design countermeasures Design countermeasures to lower the risk of threats Countermeasures may reduce the likelihood and/ or the impact of threats Countermeasures also have costs Note that some countermeasures are specific to certain threats while others can address more Possible countermeasures: Armed guards Mosquito net Stockade walls Doctors, medicine Insurance Traps Campfire 13 13
14 Controls can be PrevenAve with the aim of prevenang an incident from happening DetecAve with the aim of detecang an incident, so any acaon / intervenaon / correcaon becomes possible CorrecAve taking an acaon aber an incident has happened to repair any damage CompensaAng control the ideal control is not in place, we use some lesser controls instead 14 14
15 Risk- based approach to security You have limited resource to address threats The risk- based approach helps us allocate our resources in the most efficient way; i.e. to reduce risks as much as possible reduce risk to an acceptable level reduce risk as much as you can with the available resources Modern informaaon security management systems follow a risk- based approach (too) 15 15
16 Approaches to security 1. Baseline: a standard set of controls everywhere easy- to implement, easy to check can become a waste of money 2. Risk- based: allocate controls based on risk hard to assess risk, hard to implement properly, can always be debated financially opamal soluaon (if done well) 3. ConAnuous improvement regardless of what you do, focus on doing a beger job than before straighhorward 4. Bring your own security policy J define your requirements, check if they are implemented correctly very flexible very hard to understand & evaluate by outsiders Note the contradicaons between these approaches 16 16
17 Informa4on Security Management Public InfoSec Key Cryptographic Management CAs 17
18 Informa4on Security InformaAon is an asset for businesses/organizaaons, so informaaon needs to be protected The aim of informaaon security is to protect this informaaon with respect to confidenaality: ensuring that unauthorized paraes cannot obtain/learn the informaaon integrity: ensuring that unauthorized changes cannot happen to the informaaon availability: ensuring that authorized paraes have access to the informaaon they need IT Security (protects IT or via IT) vs InformaAon Security (protects informaaon regardless of the media/system it resides one) 18 18
19 Informa4on Security Management Management: gekng things done through others InformaAon Security Management describes controls an organizaaon needs to implement to ensure that it sensibly reduces informaaon security risks InformaAon security management standards provide frameworks for establishing informaaon security management systems in an organizaaon allow informaaon security to be assessed or compared at different organizaaons provide means to express that you are secure towards management / customers / etc
20 ISO/IEC A key standard for informaaon security management Defines an InformaAon Security Management System (ISMS) Follows the philosophy of the quality management standard ISO 9001 quality vs security Based on previous BS 7799 standards COBIT is another widespread IS management / IT governance standard, but this presentaaon follows ISO
21 ISO contents at a high level Context of the organizaaon who are the stakeholders? what are their requirements/expectaaons? Leadership commitment form senior management for infosec informaaon security policy defined infosec roles and responsibiliaes Planning & Support risk based, based on stakeholder expectaaons documented plans, retaining evidence OperaAon Performance EvaluaAon check if we are doing the right things; internal audit Improvement handling incidents, taking correcave acaons, conanuous improvement Annex A: Reference control objecaves 21 21
22 ISO 27001: Plan Do Check Act Plan Planning Support Improvement Act Do OperaAons Performance EvaluaAons Check 22 22
23 ISO key concepts Ensure you understand stakeholder requirements Gain support for senior management to informaaon security Maintain an inventory of assets, follow a risk- based approach when planning controls Check for security gaps, check if you are going the right way Learn from your mistakes, improve the system conanuously 23 23
24 ISO Annex A: Reference controls InformaAon security policies OrganizaAon of informaaon security Human resource security Asset Management Access Control Cryptography Physical and environmental security OperaAons security CommunicaAons security System acquisiaon, development and maintenance Supplier relaaonship InformaAon security incident management Business conanuity management Compliance 24 24
25 Statement of Applicability The organizaaon states that it applies ISO States which controls it applies And jusafies which controls it does not apply Must be output of risk assessment 25 25
26 InfoSec Management requirements at Cer4ficate Authori4es Public InfoSec Key Cryptographic Management CAs 26
27 Assets Key assets of the CA are: CA signing keys signing ceraficates, revocaaon lists, OCSP responses, etc. Registries which ceraficate was issued to which person what verificaaon has been performed which ceraficate has been revoked and when Public Key Cryptographic Primi4ves 27
28 Threats - A`ackers Cybercriminals they are in for the money want to maximize their profit agack targets where the most money can be gained with the least investment / risk HackAvist groups loosely organized follow ideologies, not for financial gain Government- sponsored supports real- world acaviaes of a state not only works in cyberspace, not for financial gain cyber war vs cyber espionage 28 28
29 Anatomy of an cyber a`ack 1. Reconnaissance 2. WeaponizaAon 3. Delivery 4. ExploitaAon 5. InstallaAon 6. Command and Control 7. AcAons 8. (Covering tracks) Source: Hutchins, Cloppert, Amin (2011) 29 29
30 Norma4ve documents EU ETS TS : Policy requirements for ceraficaaon authoriaes issuing qualified ceraficates ETSI TS : Policy requirements for ceraficaaon authoriaes issuing public key ceraficates CEN CWA : Security Requirements for Trustworthy Systems Managing CerAficates for Electronic Signatures - Part 1: System Security Requirements NaAonal + EU- wide regulaaons US + internaaonal Webtrust CAB Forum Baseline Requirements (CAB Forum EV Guidelines) CAB Forum Network Security Controls 30 30
31 Key points CA signing keys must be in an HSM with a security ceraficaaon (e.g. FIPS 140- X) CA must act with due diligence when verifying the request / requestor CA must accept revocaaon request conanuously and take Amely acaon to revoke the necessary certs CA must employ trusted people (e.g. clear criminal record) who are competent (must be trained, must formally accept responsibility) CA is liable for the ceraficates issues financial requirements (e.g. liability insurance) CA must maintain conanuous operaaon, revocaaon informaaon must be available to relying paraes CA must be audited regularly, with some parts of the audit made public 31 31
32 Summary / conclusions Cryptography is bypassed, not penetrated Adi Shamir Crypto can only work if there are good key management processes behind it CAs also need good, secure processes InformaAon security management can ensure that an organizaaon and its processes are secure; key principles: Support from senior management Risk- based approach for distribuang resources Learn from mistakes (Plan- Do- Check- Act) ConAnuous improvement ISO is one of the key infosec management standards 32 32
Electronic Signature. István Zsolt BERTA [email protected]. Public Key Cryptographic Primi4ves
Electronic Signature István Zsolt BERTA [email protected] Public Key Cryptographic Primi4ves 1 Electronic Signatures - Contents 1. Public key cryptography primiaves 2. CerAficates, CerAficate AuthoriAes,
CA Self-Governance: CA / Browser Forum Guidelines and Other Industry Developments. Ben Wilson, Chair, CA / Browser Forum
CA Self-Governance: CA / Browser Forum Guidelines and Other Industry Developments Ben Wilson, Chair, CA / Browser Forum Chronology of Frameworks 1995-1996 PKIX chartered, BS 7799 published, EU Recommendation
Execu&ve Coaching Program Design Checklist
Execu&ve Coaching Program Design Checklist Anyone responsible for execu1ve coaching in his/her organiza1on will benefit from this checklist. We have compiled all the key ques1ons that must be asked for
Cybersecurity Capacity Assessment of the Republic of Kosovo. Lara Pace Kosovo June 2015
Cybersecurity Capacity Assessment of the Republic of Kosovo Lara Pace Kosovo June 2015 CMM - Five Dimensions Levels of Maturity Start- up: At this level either nothing exists, or it is very embryonic in
Auditor view about ETSI and WebTrust criteria. Christoph SUTTER
Auditor view about ETSI and WebTrust criteria Christoph SUTTER Outline 1. Conformity Assessment (in general) relevant standards criteria / normative document certification object (here certification service
Danske Bank Group Certificate Policy
Document history Version Date Remarks 1.0 19-05-2011 finalized 1.01 15-11-2012 URL updated after web page restructuring. 2 Table of Contents 1. Introduction... 4 2. Policy administration... 4 2.1 Overview...
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance. ETSI 2015. All rights reserved
ETSI SECURITY WEEK EIDAS Overview CEN/ETSI esignature Standardization including standards for TSP Compliance esignature Standards Framework Certificate Authority Time-stamping Signing Servers Validation
ETSI TS 102 640-3 V1.1.1 (2008-10) Technical Specification
TS 102 640-3 V1.1.1 (2008-10) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Architecture, Formats and Policies; Part 3: Information Security
System Aware Cyber Security Architecture
System Aware Cyber Security Architecture Rick A. Jones October, 2011 Research Topic DescripAon System Aware Cyber Security Architecture Addresses supply chain and insider threats Embedded into the system
RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0
Forum RECOMMENDATIONS for the PROCESSING of EXTENDED VALIDATION SSL CERTIFICATES January 2, 2014 Version 2.0 Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying and distribution
Best prac*ces in Cer*fying and Signing PDFs
over 10 years of securing identities, web sites & transactions Best prac*ces in Cer*fying and Signing PDFs Paul van Brouwershaven Business Development Director EMEA, GlobalSign @vanbroup on TwiEer INTERNATIONAL
(Instructor-led; 3 Days)
Information Security Manager: Architecture, Planning, and Governance (Instructor-led; 3 Days) Module I. Information Security Governance A. Introduction to Information Security Governance B. Overview of
BUYPASS CLASS 3 SSL CERTIFICATES Effective date: 11.06.2013
CERTIFICATE POLICY BUYPASS CLASS 3 SSL CERTIFICATES Effective date: 11.06.2013 PUBLIC Version: 2.0 Document date: 11.05.2013 Buypass AS Nydalsveien 30A, PO Box 4364 Nydalen Tel.: +47 23 14 59 00 E-mail:
SPAMTRACER TRACKING FLY- BY SPAMMERS
SPAMTRACER TRACKING FLY- BY SPAMMERS RIPE 67 PIERRE- ANTOINE VERVIER SYMANTEC RESEARCH LABS Pierre- [email protected] RIPE 67 - Athens - Oct. 14 th - 18 th, 2013 1 2 Where It All Begins CONJECTURE
CERTIFICATION PRACTICE STATEMENT UPDATE
CERTIFICATION PRACTICE STATEMENT UPDATE Reference: IZENPE-CPS UPDATE Version no: v 5.03 Date: 10th March 2015 IZENPE 2015 This document is the property of Izenpe. It may only be reproduced in its entirety.
How to Develop a Funding Model
How to Develop a Funding Model Seri Renkin CEO, ten20 Foundation Caroline Chernov Executive Director, ten20 Foundation Greg Peel CEO & Managing Director, Bendigo Bank Community Sector Banking Jane Vadiveloo
Road map for ISO 27001 implementation
ROAD MAP 1 (5) ISO 27001 adopts the "Plan-Do-Check-Act" (PDCA) model, which is applied to structure all ISMS processes: PDCA Plan (establish the ISMS) Do (implement and operate the ISMS) Descriprion Establish
CA-DAY 2014. Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft
CA-DAY 2014 Michael Kranawetter, Chief Security Advisor (Tom Albertson, Security Program Manager) Microsoft Microsoft s Root Program in 2014 New Technical Requirements Published in November 2013 First
ETSI TS 101 456 V1.4.3 (2007-05)
TS 101 456 V1.4.3 (2007-05) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing qualified certificates 2 TS 101 456 V1.4.3
ISO 27000 Information Security Management Systems Foundation
ISO 27000 Information Security Management Systems Foundation Professional Certifications Sample Questions Sample Questions 1. is one of the industry standards/best practices in Service Management and Quality
Land Registry. Version 4.0 10/09/2009. Certificate Policy
Land Registry Version 4.0 10/09/2009 Certificate Policy Contents 1 Background 5 2 Scope 6 3 References 6 4 Definitions 7 5 General approach policy and contract responsibilities 9 5.1 Background 9 5.2
ETSI TS 102 042 V2.4.1 (2013-02)
TS 102 042 V2.4.1 (2013-02) Technical Specification Electronic Signatures and Infrastructures (ESI); Policy requirements for certification authorities issuing public key certificates 2 TS 102 042 V2.4.1
How small and medium-sized enterprises can formulate an information security management system
How small and medium-sized enterprises can formulate an information security management system Royal Holloway Information Security Thesis Series Information security for SMEs Vadim Gordas, MSc (RHUL) and
e-szigno Digital Signature Application
MICROSEC Software Development Ltd. e-szigno Digital Signature Application Microsec Software Development Ltd. www.e-szigno.hu www.microsec.hu 1031 Budapest, Záhony utca 7. (+36-1) 505-4444 Cg. 01-09-078353
ISMS Implementation Guide
atsec information security corporation 9130 Jollyville Road, Suite 260 Austin, TX 78759 Tel: 512-615-7300 Fax: 512-615-7301 www.atsec.com ISMS Implementation Guide atsec information security ISMS Implementation
CSE543 - Introduction to Computer and Network Security. Module: Public Key Infrastructure
CSE543 - Introduction to Computer and Network Security Module: Public Key Infrastructure Professor Trent Jaeger 1 Meeting Someone New Anywhere in the Internet 2 What is a certificate? A certificate makes
ETSI TC ESI PRESENTATION TO CAB FORUM. ETSI 2015. All rights reserved
ETSI TC ESI PRESENTATION TO CAB FORUM Iñigo Barreira March 2015 meeting, Cupertino ETSI 2015. All rights reserved Index ETSI Deliverables. Dates ETSI audits eidas timeline: Qualified web site certificates
ETSI TS 102 640-3 V2.1.1 (2010-01) Technical Specification
TS 102 640-3 V2.1.1 (2010-01) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
IT Governance: The benefits of an Information Security Management System
IT Governance: The benefits of an Information Security Management System Katerina Cai, CISSP Hewlett-Packard 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
SAP, Credit Cards and the Bird that Talks Too Much. Ertunga Arsal
SAP, Credit Cards and the Bird that Talks Too Much Ertunga Arsal Agenda Business Processes SAP Systems Exploit Demo SAP Credit Cards and Birds External Payment SoluAons on SAP How to Stay Secure About
Certum QCA PKI Disclosure Statement
CERTUM QCA PKI Disclosure Statement v1.1 1 Certum QCA PKI Disclosure Statement Version 1.1 Effective date: 1 st of April, 2016 Status: valid Asseco Data Systems S.A. ul. Żwirki i Wigury 15 81-387 Gdynia
ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters
When Recognition Matters WHITEPAPER ISO/IEC 27002:2013 INFORMATION TECHNOLOGY - SECURITY TECHNIQUES CODE OF PRACTICE FOR INFORMATION SECURITY CONTROLS www.pecb.com CONTENT 3 4 5 6 6 7 7 7 7 8 8 8 9 9 9
Apple Corporate Email Certificates Certificate Policy and Certification Practice Statement. Apple Inc.
Apple Inc. Certificate Policy and Certification Practice Statement Version 2.0 Effective Date: April 10, 2015 Table of Contents 1. Introduction... 4 1.1. Trademarks... 4 1.2. Table of acronyms... 4 1.3.
TL 9000 Measurements Handbook, Release 5.0
Logo or heading here TL 9000 Measurements Handbook, Release 5.0 Changes from Release 4.5 Overview Measurements Handbook Changes R4.5 to R 5.0 Input from Sub- teams and IniAaAves tasked with developing
Technology Risk Management
1 Monetary Authority of Singapore Technology Risk Guidelines & Notices New Requirements for Financial Services Industry Mark Ames Director, Seminar Program ISACA Singapore 2 MAS Supervisory Framework Impact
ETSI TR 103 123 V1.1.1 (2012-11)
TR 103 123 V1.1.1 (2012-11) Technical Report Electronic Signatures and Infrastructures (ESI); Guidance for Auditors and CSPs on TS 102 042 for Issuing Publicly-Trusted TLS/SSL Certificates 2 TR 103 123
University of Greenwich Graduate Internship Programme. Welcome Jerry Allen
University of Greenwich Graduate Internship Programme Welcome Jerry Allen th Monday 5 November AdministraAon IntroducAon unal 12.30 12.30-1.30 lunch 1.30-4.30 CompeAtor Analysis AdministraAon Passport/ID
REGISTRATION AUTHORITY (RA) POLICY. Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A.
REGISTRATION AUTHORITY (RA) POLICY Registration Authority (RA) Fulfillment Characteristics SECURITY DATA SEGURIDAD EN DATOS Y FIRMA DIGITAL, S.A. INDEX Contenido 1. LEGAL FRAMEWORK... 4 1.1. Legal Base...
How To Assess Risk On A Trust Service Provider
European Union Agency for Network and Information Security www.enisa.europa.eu About ENISA The European Union Agency for Network and Information Security (ENISA) is a centre of network and information
ETSI TS 102 640-3 V2.1.2 (2011-09)
TS 102 640-3 V2.1.2 (2011-09) Technical Specification Electronic Signatures and Infrastructures (ESI); Registered Electronic Mail (REM); Part 3: Information Security Policy Requirements for REM Management
AllSeen Summit 2015: IoT: Taking PKI Where No PKI Has Gone Before Presented by: Scott Rea DigiCert Sr. PKI Architect ALLSEEN ALLIANCE
AllSeen Summit 2015: IoT: Taking PKI Where No PKI Has Gone Before Presented by: Scott Rea DigiCert Sr. PKI Architect Agenda Slide Title 3 Trust and PKI 9 Web Security - PKI example 26 Traditional PKI Principles
TTP.NL Scheme. for management system certification. of Trust Service Providers issuing. Qualified Certificates for Electronic Signatures,
TTP.NL Scheme for management system certification of Trust Service Providers issuing Qualified Certificates for Electronic Signatures, Public Key Certificates, Website Certificates and / or Time-stamp
InfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
How To Implement An Information Security Management System
ISO/IEC 27001 Informa2on Security Management System Presented by Daminda Perera 26/07/2008 ISO/IEC 27001:2005 Informa@on technology Security techniques Informa@on security management systems Requirements
White Paper - Measuring the Effectiveness of Security using ISO 27001
Measuring the Effectiveness of Security using ISO 27001 Steve Wright, Senior Consultant Whilst the intentions and objectives behind ISO 27001 aren t dramatically different to those in BS 7799:2002, one
TC TrustCenter GmbH Time-Stamp Policy
GmbH Time-Stamp Policy NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This document may not be copied, distributed, used, stored or transmitted in any form or
Egypt s E-Signature & PKInfrastructure
EGYPT-MCIT ITIDA Egypt s E-Signature & PKInfrastructure Seminar on Electronic Signature Algeria 8-9 Dec. 2009 By: Hisham Mohamed Abdel Wahab Head of the E-Signature CA Licensing ITIDA- MCIT EGYPT Email:
Cyber Security Review
ISSN 2055-6950 (Print) ISSN 2055-6969 (Online) Cyber Security Review Winter 2014/15 CYBERCRIME AS A NATIONAL SECURITY ISSUE CECSP: TOWARDS EFFECTIVE COLLABORATION ON CYBER SECURITY IN CENTRAL EUROPE TECHNICAL
CA/Browser Forum. Guidelines For The Issuance And Management Of Extended Validation Code Signing Certificates
Version 1.3 CA/Browser Forum Guidelines For The Issuance And Management Of Extended Validation Code Signing Certificates Copyright 2007-2014, The CA / Browser Forum, all rights reserved. Verbatim copying
How to gain and maintain ISO 27001 certification
Public How to gain and maintain ISO 27001 certification Urpo Kaila, Head of Security CSC IT Center for Science ltd. [email protected], [email protected] GÉANT SIG ISM 1 st Workshop, 2015-05-12, imperial.ac.uk
Secure Signature Creation Devices (SSCDs)
Secure Signature Creation Devices (SSCDs) from different approaches Dr. István Zsolt BERTA [email protected] Microsec Ltd. Requirements for SSCDs Annex III of the e-signature Directive, in plain
SSL CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT
SSL CERTIFICATE POLICY AND CERTIFICATION PRACTICE STATEMENT Kamu Sertifikasyon Merkezi TÜBİTAK Yerleşkesi, P.K. 74 Gebze 41470 Kocaeli, TURKEY Tel: +90 (0) 262 648 18 18 Fax: +90 (0) 262 648 18 00 www.kamusm.gov.tr
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
Information Security Awareness Training
Information Security Awareness Training Presenter: William F. Slater, III M.S., MBA, PMP, CISSP, CISA, ISO 27002 1 Agenda Why are we doing this? Objectives What is Information Security? What is Information
TTP.NL Guidance ETSI TS 101 456
ECP.NL TTP.NL on ETSI TS 101 456 Project TTP.NL on ETSI TS 101 456 30 May 2002 ECP.NL, CCvD-TTP.NL TTP.NL on ETSI TS 101 456 Table of Contents Table of Contents... 2 Foreword... 3 1 Scope... 4 2 References...
Thai Digital ID Co.,Ltd.
Thai Digital ID Co.,Ltd. Building Trusted National Root CA - Thailand s Experience ISO27001 Enabling Trust and Security for Reliability of your Business TDID & CA Service Standard PKI Environment CA Hosting
Making Digital Signatures Work across National Borders
Making Digital Signatures Work across National Borders Jon Ølnes, Anette Andresen, Leif Buene, Olga Cerrato, Håvard Grindheim DNV (Det Norske Veritas), Norway DNV trusted third party for 140 years Det
ISO/IEC 27001 Information Security Management System Vs. ITIL IT Security Management
ISO/IEC 27001 Information Security Management System Vs ITIL IT Security Management ISMS ITIL ITSM Presented by Mark E.S. Bernard, CGEIT, CISM, CISA, CISSP, ISO27k Lead Auditor, PM, ITIL/COBiT Foundation,
Independent Accountants Report
KPMG LLP 345 Park Avenue New York, NY 10154-0102 Independent Accountants Report To the Management of Unisys Corporation: We have examined the assertion by the management of Unisys Corporation (Unisys)
Operating a CSP in Switzerland or Playing in the champions league of IT Security
Operating a CSP in Switzerland or Playing in the champions league of IT Security Agenda SwissSign Technology Products and Processes Legal Aspects and Standards Business Model Future Developments 2 SwissSign
Foreword... 11 Introduction - The Global Food Safety Initiative (GFSI)... 11 Scope... 12 Section Overview... 12 Normative References...
Version 6.3 Overview Contents Foreword... 11 Introduction - The Global Food Safety Initiative (GFSI)... 11 Scope... 12 Section Overview... 12 Normative References... 13 9 Foreword Global Food Safety Initiative
In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), REGULATION
In accordance with article 11 of the Law on Electronic Signature (Official Gazette of the Republic of Serbia No. 135/04), the Minister of Telecommunications and Information Society hereby promulgates REGULATION
COPYRIGHTED MATERIAL. Contents. Acknowledgments Introduction
Contents Acknowledgments Introduction 1. Governance Overview How Do We Do It? What Do We 1 Get Out of It? 1.1 What Is It? 1 1.2 Back to Basics 2 1.3 Origins of Governance 3 1.4 Governance Definition 5
Criminal charges are not pursued: Hacking PKI
Criminal charges are not pursued: Hacking PKI Mike Zusman Principal Consultant [email protected] About the Title From StartCom Critical Event Report https://blog.startcom.org/?p=161 Thanks
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
CPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 1 September 2, 2015 CPSC 467, Lecture 1 1/13 Protecting Information Information security Security principles Crypto as a security
Information Security ISO Standards. Feb 11, 2015. Glen Bruce Director, Enterprise Risk Security & Privacy
Information Security ISO Standards Feb 11, 2015 Glen Bruce Director, Enterprise Risk Security & Privacy Agenda 1. Introduction Information security risks and requirements 2. Information Security Management
Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013
Security framework Guidelines for trust services providers Part 1 Version 1.0 December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Security framework Guidelines
Preparing yourself for ISO/IEC 27001 2013
Preparing yourself for ISO/IEC 27001 2013 2013 a Vintage Year for Security Prof. Edward (Ted) Humphreys ([email protected]) [Chair of the ISO/IEC and UK BSI Group responsible for the family of ISMS standards,
WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities Extended Validation Code Signing
WebTrust SM/TM for Certification Authorities WebTrust Principles and Criteria for Certification Authorities Extended Validation Code Signing Based on: CA/Browser Forum Guidelines for the Issuance and Management
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014
DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014 Revision History Update this table every time a new edition of the document is published Date Authored
Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample
Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST
CS 6262 - Network Security: Public Key Infrastructure
CS 6262 - Network Security: Public Key Infrastructure Professor Patrick Traynor 1/30/13 Meeting Someone New 2 What is a certificate? A certificate makes an association between a user identity/job/ attribute
Course: Information Security Management in e-governance. Day 1. Session 3: Models and Frameworks for Information Security Management
Course: Information Security Management in e-governance Day 1 Session 3: Models and Frameworks for Information Security Management Agenda Introduction to Enterprise Security framework Overview of security
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
Trustis FPS PKI Glossary of Terms
Trustis FPS PKI Glossary of Terms The following terminology shall have the definitions as given below: Activation Data Asymmetric Cryptosystem Authentication Certificate Certificate Authority (CA) Certificate
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
TC TrustCenter GmbH Time-Stamp Practice and Disclosure Statement
GmbH NOTE: The information contained in this document is the property of TC TrustCenter GmbH. This document may not be copied, distributed, used, stored or transmitted in any form or by any means, whether
Security Control Standard
Security Standard The security and risk management baseline for the lottery sector worldwide Updated by the WLA Security and Risk Management Committee V1.0, November 2006 The WLA Security Standard is the
Critical Infrastructure Private Guarding Company Requirements Checklist
Critical Infrastructure Private Guarding Company Requirements Checklist Introduction 1. Secure and protected critical infrastructure sites are vital to the security and stability of each EU Member State
How to set up a CSIRT in an ITIL driven organization. Christian Proschinger Raiffeisen Informatik GmbH
How to set up a CSIRT in an ITIL driven organization Christian Proschinger Raiffeisen Informatik GmbH Introduction R-IT CERT Idea Introduction to ITIL Example Vulnerability Management Lessons Learned Raiffeisen
CERTIFICATE. certifies that the. Info&AA v1.0 Attribute Service Provider Software. developed by InfoScope Ltd.
CERTIFICATE HUNGUARD Informatics and IT R&D and General Service Provider Ltd. as a certification authority assigned by the assignment document No. 001/2010 of the Minister of the Prime Minister s Office
IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION
48 IMPLEMENTATION OF SECURITY CONTROLS ACCORDING TO ISO/IEC 27002 IN A SMALL ORGANISATION MATÚŠ HORVÁTH, MARTIN JAKUB 1 INTRODUCTION Managerial work is directly dependent on information, it is therefore
Cybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
