SIMSON Security Incident Management System

Similar documents
Duty of Care - are your employees safe?

Success Factors in APM Adoption

International HR Conference 2009 Talent Management

IFDD and Middle East Department s Position within the IRW Structure. The International Fundraising Development Division (IFDD) Structure

CLOUD MANAGED SERVICES FRAMEWORK E-BOOK

Targeted Marketing Effectiveness with the Sage 200 Suite

VACANCY ANNOUNCEMENT Website and Database Associate Based at East Jerusalem, OCHA opt

Security Policy for ActionAid International Approved version

Keep managers better informed on their areas of responsibility and highlight the issues that require their attention with dashboards!

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

HIGHLY SOPHISTICATED MONITORING

Typical System Architecture YOU CAN T MANAGE WHAT YOU CAN T MEASURE

Why Should You Use Sahana Eden?

THE IMPORTANCE OF FINANCIAL MANAGEMENT FOR ECOMMERCE.

ITIL A guide to event management

Managing Attendance with Points Reduce Absenteeism, Control Labor Costs and Improve Workforce Management

10 steps to the Cloud for SMBs Introduction to Cloud computing. Ask the Experts. Making Business Work Better Online

Case Management. itouch Vision. This document gives an overview of Case management and discusses the different features and functionality.

3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Canada ACN Home Security

Websense Data Security Solutions

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Top Five Ways Any Business Can Benefit from Box

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

CenterMind G+ Smart and Proactive Environment Monitoring

CHAPTER 1 ANALYZING BUSINESS GOAL & CONSTRAINTS

CRM for Business Intelligence

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

How To Protect A Web Application From Attack From A Trusted Environment

What s New in Help Desk Authority 8.2?

E-Guide. Sponsored By:

Improving Business for SMEs with Online Backup Improving Business for SMEs with Online Backup

Tk20 Network Infrastructure

Security Management Training Course Notes

BS 7 SIS Safety Information System Green Light for Your Production

Can you afford another day without Managed File Transfer (MFT)?

How IT Can Help Companies Make Better, Faster Decisions

NVIRON SUPPORT SERVICES OVERVIEW

ZATAR ENTERPRISE CLOUD PRINT Zatar Enterprise Cloud Print is a service that connects your Zebra printer to the web.

ITIL A guide to Event Management

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

SPOK HEALTHCARE CONSOLE. Improving the Way Your Hospital Contact Centre Manages Critical Communications

VACANCY ANNOUNCEMENT # Website Assistant (National Position)

How To Recruit On Jobsinrootics.Com

BEYOND the INITIAL CONNECTION: HOW TO TRANSFORM YOUR B2B EXCHANGE

Identifying people with learning disabilities

Managing a Critical Outsourcing Partnership

FTP-Stream Data Sheet

HEALTH INFORMATION MANAGEMENT

EXPERT STRATEGIES FOR LOG COLLECTION, ROOT CAUSE ANALYSIS, AND COMPLIANCE

Compliance and Unified Communication

How To Read Memory Chips From A Cell Phone Or Memory Chip

reflected and translated into policy orientations and priorities as well strategy documents and a management plan.

Mailwall Remote Features Tour Datasheet

Voice and data recording Red Box makes it easier than you imagine

Track accurately. Deliver with precision.

Dynacom presents its Office Furniture Sales Management Solution

SuperNav for Heavy Equipment

USE. Toyota: How to navigate the recall storm with social media monitoring.

Secunia Vulnerability Intelligence Manager (VIM) 4.0

Zoho Projects. Social collaborative project management platform

Introduction of Intrusion Detection Systems

Group Management Server User Guide

Streamlining HR to Improve the Bottom Line. An Executive Guide to ROI

DELTA Dashboards Visualise, Analyse and Monitor kdb+ Datasets with Delta Dashboards

How To Use Intacct

UNIFIED THREAT MANAGEMENT SOLUTIONS AND NEXT-GENERATION FIREWALLS ADMINISTRATION TOOLS NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

For more information on vacancy sites see our Resource Sheets on Volunteering and Career Development Opportunities.

Protecting Your Organisation from Targeted Cyber Intrusion

Taking the first step to agile digital services

MAXIMIZING YOUR DATA CENTER INFRASTRUCTURE: CENTRALIZED MANAGEMENT AND WIRE-FREE ENVIRONMENTAL MONITORING

Don t let your SIeM become your Nightmare!

Annex 1: Assesing risk: threats, vulnerabilities and capacities

Agio Remote Monitoring and Management

QuickSpecs. HP PCM Plus v4 Network Management Software Series (Retired) Key features

Dashboards as an Effective Tool for HIPAA Security and Privacy Compliance

CMP3002 Advanced Web Technology

-Vacancy - Head of Communications (m/f) Fulltime & based in Berlin

Candidate Brief. Database Marketing Officer

Transcription:

It s a dangerous business going out your front door. J.R.R. Tolkien (1892-1973) SIMSON Security Incident Management System Purpose: Method: Participants: Location: Language: A web based platform to record, manage, analyse and share security incidents & information internally and among other NGOs. Web based platform to be used inside your organisation with the possibility to share with other organisations. NGOs Worldwide English Costs: Account per month: 25,- (excl. 21% VAT). Want to join? For more information about Simson, please contact Ebe Brons: +31 33 463 0293, ebe@centreforsafety.org) Benefits: Easy & time saving; fill in the incident reporting form and the right persons will automatically be informed. Creates a database and institutional memory; even with high staff turnover, you will know what happened even if this was years ago. Monitoring your organisational security; Simson enables you to store and share your security documents and monitor globally if your security documents are updated on time. Stay informed; Simson allows you to see what happens almost in real-time. This gives you more grip on security in a rapidly changing environment. Automated alerts keep you updated of recent security incidents. Sharing; You can connect with other Simson users and start sharing information, this gives you more information to analyse and enables better decision-making.

Easy & time saving Simson saves you time. It is quick and easy. Just fill in the reporting form and let Simson take care of the rest. You can use the saved time to manage the incident. Database & institutional memory By collecting your incidents electronically, an institutional memory is created. This limits the knowledge drain that rises from (possible) staff turnover. A new security focal point can easily check the database to know what happened in the past. Monitoring your organisational security Simson enables you to carry out basic analysis of security incidents and trends. Using the filters to examine different incident categories, contacts, timeframe and the locations of incidents on the map. You can also use Simson to monitor if your security documents (crisis plans, security protocols etc.) are regularly updated. The system keeps track of outdated documents via email alerts. 2

Stay informed Sharing incidents internally and between other NGOs increases your knowledge. This increased knowledge makes effective security management possible within all the participating NGOs. By adding this knowledge to the understanding of the local context, the quality of security decisions will improve. Email alerts keep you informed of recent incidents. You can use Simson to filter the alerts. That way you only receive the alerts you want to receive. Do I have to share everything? You control your own information. There are three levels of sharing: Do not share; the information is only visible in your account. Basic sharing; the information you share with other NGOs consists only of basic information and no details. Full sharing; the whole incident form including details is shared. How can I use Simson as an internal system? Simson enables you to share security information within your organisation. HQ, field offices and local NGO partners can be involved. Every office receives an account. With this account the office can report their security incidents and other security information. The accounts can connect to each other and start sharing their information automatically. The offices can also share security documents. These documents have to be updated after a certain period of time. Simson keeps track of this deadline and alerts you when the document is outdated. The Simson incident reporting system is a great way to share incident information with my NGO colleagues. It s easy to use and the map feature is a great way to visualize the data. It s also helpful to view the incidents that my NGO colleagues have reported. Michael O'Neill Director Global Safety & Security, Save the Children International 3

What are the principles of Simson? Trust and security Trust between Simson users is the basis to share sensitive information. Internet security is based on secure server databases and (https) data encryption to safety wire the information over the internet. HQ Security SIMSON Security Manager NGO B Incident form is filled in by the security manager. Simson informs other security managers and staff using the website and e-mail. Reciprocity Simson makes sure people share information and not only use the system to get information. You can only receive information from another user if you also share your information with this user. Security Manager NGO A Security Manager NGO B The Security Manager of NGO A shares his/her incidents with NGO B. The sharing works two ways, never one way. 4

Control You can choose to share your security incidents with a contact in two ways, full and basic. Basic information is the minimal amount of information a contact needs in order to use it. Full contacts get access to all the details of the incident report. You choose with what level of information you would like to share. HQ Security Field NGO shares full incidents with this contact and vice versa. Incident form is filled in by. Manager NGO B Field NGO shares basic incidents with this contact and vice versa. Let see some how to movies about Simson How to report an incident How to use the filters Want to join Simson? You can join Simson by contacting Ebe Brons (ebe@centreforsafety.org, phone: +31 33 463 0293). He will inform you about the possibilities. About Centre for Safety and Development CSD is a non-profit foundation specialised in safety and security for humanitarian organisations worldwide. We believe that sharing security knowledge and skills enables other humanitarian organisations to work in unsafe areas in order to reduce human suffering and bring about a better world. Read more about CSD on: www.centreforsafety.org. 5