Information Security Seminar 2013



Similar documents
Legislative Council Panel on Information Technology and Broadcasting. Information Security

DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Government s Cloud Computing Programme

How To Develop A Cloud In Hong Kong

立 法 會 Legislative Council

Legislative Council Panel on Information Technology and Broadcasting. Information Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security

DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Adoption of Cloud Computing Model in Government

Head 47 GOVERNMENT SECRETARIAT: OFFICE OF THE GOVERNMENT CHIEF INFORMATION OFFICER

Digital Economy Facilitation Division, OGCIO Industry Forum July 2012

ITEM FOR FINANCE COMMITTEE

Major IT projects currently undertaken by Bureaux/Departments (B/Ds) with project details and staff deployment

Working Group on Cloud Security and Privacy. Brief Update on EGCCSS and WGPIUCS 24 June 2015

Head 47 GOVERNMENT SECRETARIAT: OFFICE OF THE GOVERNMENT CHIEF INFORMATION OFFICER

ESKISP Conduct security testing, under supervision

Legislative Council Panel. on Information Technology and Broadcasting. Implementation of a Government Cloud Platform

Legislative Council Panel on Information Technology and Broadcasting Policy Address Policy Initiatives of Innovation and Technology Bureau

立 法 會 Legislative Council

Legislative Council Panel on Information Technology and Broadcasting Progress Update on E-Government Development Purpose

National Cyber Security Policy -2013

Adopting Cloud Computing with a RISK Mitigation Strategy

Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region

(a) CWRF Head 710 Computerisation

For Discussion Paper No. 11/2012 on 22 November DIGITAL 21 STRATEGY ADVISORY COMMITTEE International IT Fest 2013

CYSPA - EC projects supporting NIS

Cybersecurity in the States 2012: Priorities, Issues and Trends

Build a Secure Cyberspace 2015 Cyber Security is Everywhere Graphic Design Contest

Cloud Security for SME

Cyber Security - What Would a Breach Really Mean for your Business?

Seminar on Unfair Competition Enforcement in the United States and Supply Chain Cybersecurity Issues. Palace Hotel Saigon, HCMC, November 19 th 2014

Overview TECHIS Carry out security testing activities

CIP 2016 Project Outline

PROCUREMENT AND INVENTORY MANAGEMENT OF ICT PRODUCTS AND SERVICES. Executive Summary

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

By Alex Lee, AGCIO(IS) Industry Forum 29 July 2011

GovHK: One-stop Portal to Deliver Citizen-centric Services. Linda So Deputy Government Chief Information Officer HKSAR Government

APRICOT-APAN 2011, Hong Kong IPv6 Transition Conference 22 February C. K. Ng

Cloud Computing and Records Management

WORKING GROUP ON CLOUD SECURITY AND PRIVACY

The IT Strategic Plan

Australian Government Cyber Security Review

The Office of the Government Chief Information Officer IT SECURITY GUIDELINES [G3]

Information Security Summit 2005

Guidance on the Use of Portable Storage Devices 1

2015 Information Security Awareness Catalogue

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

2012 Resource Allocation Exercise - Block Vote Project Proposals

Report on Hong Kong SME Cloud Adoption and Security Readiness Survey

The Office of the Government Chief Information Officer INFORMATION SECURITY INCIDENT HANDLING GUIDELINES [G54]

Working Group on. First Working Group Meeting

National Initiative for Cyber Security Education

Legislative Council Panel on Security Creation of a permanent Chief Superintendent of Police post of the Cyber Security and Technology Crime Bureau

The Future Development of egovernment in Hong Kong

Cyber security Indian perspective & Collaboration With EU

Cloud computing: benefits, risks and recommendations for information security

The Office of the Government Chief Information Officer BASELINE IT SECURITY POLICY [S17]

Cyber security Building confidence in your digital future

The Office of the Government Chief Information Officer BASELINE IT SECURITY POLICY [S17]

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

YOUR PASSPORT TO ASIA S WORLD CITY

E-Government Strategy Implementation

ICT Usage & Cyber Security Issues in Myanmar

Logging In: Auditing Cybersecurity in an Unsecure World

CITY UNIVERSITY OF HONG KONG

A Best Practice Guide

ESKISP Direct security testing

ENISA and Cloud Security

An Information Security and Privacy Perspective for Procurement Services Projects

Cyber security in an organization-transcending way

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

2013 Policy Address Policy Initiatives of Communications and Technology Branch, Commerce and Economic Development Bureau

Statement of James Sheaffer, President North American Public Sector, CSC

Cyber Security solutions

INFRASTRUCTURE ARCHITECTURE BLUEPRINT

Business Continuity Management Framework

> English > Topical Issues (Statutory Minimum Wage) > Statutory Minimum Wage: Notes for Student Employees and Employers

Legislative Council Panel on Security Youth Drug Abuse. This paper briefs Members on the latest youth drug abuse

TRANSPORT FOR LONDON SAFETY, HEALTH AND ENVIRONMENT ASSURANCE COMMITTEE

State Governments at Risk: The Data Breach Reality

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

The Danish Cyber and Information Security Strategy

National Contact Management Strategy

CYBER AND IT SECURITY: CLOUD SECURITY FINAL SESSION. Architecture Framework Advisory Committee November 4, 2014

Business Continuity Management Policy

Commonwealth IT Threat Management: Keeping Out the Cyber Villains Category: Cyber Security Initiatives. Initiation date: January 2012

For discussion on 17 January 2011 LC Paper No. CB(1) 1001/10-11(04) LEGISLATIVE COUNCIL PANEL ON PUBLIC SERVICE

Legislative Council Panel on Public Service T-contract Services

AGIMO and whole-of-government ICT Policy

INFORMATION GOVERNANCE AND SECURITY 1 POLICY DRAFTED BY: INFORMATION GOVERNANCE LEAD 2 ACCOUNTABLE DIRECTOR: SENIOR INFORMATION RISK OWNER

Infocomm Security Masterplan 2

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Cyber Security Solutions

Stellenbosch University. Information Security Regulations

Governance and Management of Information Security

Seamus Reilly Director EY Information Security Cyber Security

Secure Use of Electronic Banking Services. George Chou Hong Kong Monetary Authority Dec 2013

Collaborative development in the public sector Some thoughts based on the Belgian experience. Linuxtag

Transcription:

Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative Region 24 July 2013

Agenda 1. Introduction 2. Information Security Posture & Programmes 3. Hong Kong SAR Government Cloud Adoption 4. Cloud Challenges & Risk Mitigation 5. Closing 1

Who s Peeking At You? Security & Privacy Data Protection Outsourcing Data Location 2

3

Local ICT Environment 2.26M broadband accounts 86% household with broadband access 19 004 public Wi-Fi access points 5 mobile network operators 19 local fixed network operators 193 Internet Service Providers (ISP) 4

Local ICT Environment Strong foundation for Cloud Computing Well established legal system with good protection of intellectual property rights and personal data World-class infrastructure and ideal location in Asia for data centres Pro-business culture Proximity to the Mainland of China Talented ICT professionals 5

Set up on 1 July 2004 Provides a streamlined government structure and leadership for delivering the ICT functions within Government Enables the Government to take a proactive, leading role in championing ICT development in the community Headed by Government Chief Information Officer (GCIO), deputised by two Deputy Government Chief Information Officers (DGCIOs) 6

ICT Facts and Figures in the Government 400+ Government web sites 50+ e-government mobile apps 29 Government data centres 1300 Government IT Professionals 2500 Contract IT Professionals 7

8

Information Security Major Stakeholders Security Bureau Provide policy steer, advice and support on Government s security requirements and security incidents OGCIO Provide policy steer, advice and support on Government information security requirements and matters Coordinate and facilitate the handling of IT security incidents within Government Protect Government s central IT infrastructure and information Ensure compliance with information security policy and requirements Conduct IT security awareness promotion and training for government staff and the public Information Security Hong Kong Police Force Prevent and detect technology crime Establish the Cyber Security Centre to strengthen resilience against cyber attacks Collaborate with OGCIO & HKCERT to conduct awareness promotion and training for the public Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) Coordinate computer security incident response Disseminate security alerts to the public Collaborate with OGCIO & Police to conduct awareness promotion and training for the public Conduct security drill 9

Review of Information Security Requirements To ensure that government information security requirements can keep in pace with the advancement of technology, security trends and latest development of international/industry practices. Cloud Computing Security Social Networking Security Mobile Device Security Security Regulations, Policies and Guidelines Review, Revise and Promulgate Government Bureaux and Departments (B/Ds) 10

Security Risk Assessment and Audit To ensure information security risks of government information systems are properly managed and appropriate mitigation measures are effectively implemented. Identify security threats, vulnerabilities and corresponding impacts Information Security Risk Assessment and Third-party Audit Ensure compliance of information security policies Information Systems Adopt effective information security measures 11

Security Governance To better monitor the security status of B/Ds and help them achieve compliance with government security requirements. Security Survey Government Bureaux and Departments (B/Ds) Security Risk Assessment Result Visit & Review 12

Awareness Promotion to the Public To empower citizens to withstand new and ever-changing security threats. Thematic website www.infosec.gov.hk Public Seminars Radio clips Leaflets Multimedia materials Posters 13

14

Government Cloud Computing Strategy Outsourced Private Cloud (at contractor data centres) In-house Private Cloud (at government data centres) Public Cloud E-Government Services with Classified data Government Cloud (GovCloud) E-Government Infrastructure Services Central Computer Centre Virtualised Infrastructure E-Government Public Services without Classified data 15

Government Cloud Adoption A step by step approach to take full advantage of this new IT model while at the same time minimise the associated risks. 2011 Pilot and Testing Portal for Public Sector Information (PSI) Central Computer Centre Virtualization Mar 2011 Government Cloud Computing Strategy 2013 Provision of Shared Services Electronic Information Mgt, Human Resource Mgt, e-procurement, etc. 2014 and beyond 2012 Funding and Contracting Rollout and Review GovCloud Cloud-enabled Platform (EGIS) Government Public Cloud services 16

17

Cloud Challenges Data Protection Data location Multi-tenancy Outsourcing Data Ownership Service Continuity Off-Premises Security & Privacy Changes to Infrastructure Changes to Processes Changes to User Behaviour 18

Cloud Security Trends Source of Information: Cloud end-user survey conducted by the SME Global Alliance and Hong Kong Productivity Council in 2012. 19

Security Challenge & Risk Mitigation in Cloud Adoption Challenge Risk Mitigation Lack of corporate directions and relevant policies and guidelines Cloud adoption strategy Review of policies and guidelines Control on user authentication Access control security User education and training Assurance of information security and privacy in cloud Cloud security certifications and standards Conduct of risk assessments and audits Contractual agreement Protection of data out of organisational control boundary Data protection best practices Incident response mechanism 20

Promotion of Best Practices in Cloud Adoption 雲 資 訊 網 www.infocloud.gov.hk Practice Guide for Procuring Cloud Services Service Cost Service Level On Boarding & Off Boarding Service Operation Security and Privacy Protections Service Commitments/Warranties Data Ownership & Location and IP Ownership Service Default Contracting (Terms of Service) Expert Group on Cloud Computing Services and Standards OGCIO Security Checklists for Cloud Service Consumers Checklist for SMEs on selecting Cloud Service Provider Checklist for SMEs on using Cloud Services Checklist for Individuals on protecting their data in the Cloud Environment Security & Privacy Checklist for Cloud Service Providers in Handling Personal Identifiable Information in Cloud Platforms Policy Management Data Protection Principles Subcontractors Management Staff Management 21

22

Summary Hong Kong : Strong Foundation for Cloud Computing Cloud : Adoption through Risk Mitigation Government : Extensive Information Security Programmes 23