Risk management Sebastian Bellagamba CABASE wwTLD meeting Mar Del Plata, 3 March 2005.

Slides:



Advertisements
Similar presentations
Enterprise Resource Planning It is not the end, it is just the beginning Mary Avery Finance Manager Nebraska Auditor of Public Accounts 2006 Joint NSAA/NASC.
Advertisements

Chapter 7 Control and AIS Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 7-1.
Control and Accounting Information Systems
Chapter 4 Infrastructure as a Service (IaaS)
Since 2011 credit unions have been increasingly engaging in private student lending: Private student loan funding has grown 33%, from $1.5 Billion to.
© Copyright 2014 Saul Ewing LLP The Coalition for Academic Scientific Computation HIPAA Legal Framework and Breach Analysis Presented by: Bruce D. Armon,
Risk Identification Chapter 6.
Lecture 11 Reliability and Security in IT infrastructure.
Computer Security: Principles and Practice
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
1 Pertemuan 9 Network Security and E-Commerce Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
Stephen S. Yau CSE , Fall Security Strategies.
© 2003 by Carnegie Mellon University page 1 Information Security Risk Evaluation for Colleges and Universities Carol Woody Senior Technical Staff Software.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
Network security policy: best practices
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
IT Risk Mitigation Lewan Technology, Agility Recovery, FORTRUST & Woodruff Sawyer.
Services Tailored Around You® Business Contingency Planning Overview July 2013.
Information Security Management BS 7799 now ISO 17799:2000 Paul M Kane nic.AC wwTLD Meeting Argentina April 2005.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Project Risk Management. The Importance of Project Risk Management Project risk management is the art and science of identifying, analyzing, and responding.
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
© 2001 Carnegie Mellon University S8A-1 OCTAVE SM Process 8 Develop Protection Strategy Workshop A: Protection Strategy Development Software Engineering.
Chapter 34 risk management Section 34.1 Business Risk Management
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Risk Management For the Board of The Law Society 16 February 2005.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
RER/9/096 Regional Planning Meeting “Strengthening National Infrastructures for the Control of Radiation Sources” (TSA-1), (Phase II) Country: ESTONIA.
08/02/20051 Administrative Staff Planning Retreat Barton Creek August 2, 2005.
Implementing UP 17 February Project Phases Analysis Implementation Evaluation Development Design.
E.Soundararajan R.Baskaran & M.Sai Baba Indira Gandhi Centre for Atomic Research, Kalpakkam.
Jonathan McCoy Regional Property Underwriting Manager Zurich Energy Supply chain insurance and risk assessment Protecting profitability.
The challenge of services for new registries Giovanni Seppia Cape Town, November 30, 2004.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Software Development Risk Assessment for Clouds National Technical University of Ukraine “Kiev Polytechnic Institute” Heat and energy design faculty Department.
ICANN / Mar Del Plata April 2005 Deleting Name Auctions.
The Importance of Proper Controls. 5 Network Controls Developing a secure network means developing mechanisms that reduce or eliminate the threats.
Risk Management for Small & Medium Sized Enterprises
DIT Campus Network 2G1713 Communication Systems Design, 2004 Department of Microelectronics and Information Technology, KTH Team Members Honoratha Shayo2G1713.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Chapter 8 Risk Management Plans 8 Risk Management Plans C H A P T E R.
RISK MANAGEMENT. CONTENTS  DEFINITION  WHAT IS RISK  TYPES OF RISK  RISK MANAGEMENT PROCESS  APPROACHES TO RISK MANAGEMENT.
IS3220 Information Technology Infrastructure Security
Lecture 5 Control and AIS Copyright © 2012 Pearson Education 7-1.
Welcome to the ICT Department Unit 3_5 Security Policies.
IT Infrastructure Amna Riaz007 Tayaba Ashraf008.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Technology and Business Continuity
Informal meeting on the organisation and the future of ETAES
Risk management.
Supply Chain Management
Risk management Giovanni Seppia wwTLD meeting
Chapter 34 risk management Section 34.1 Business Risk Management
Interreg V-A Romania-Bulgaria Programme
Business Continuity Plan Training
Restoring Cluster Disks
Recognization and management of RISK in educational projects
CompTIA Security+ Study Guide (SY0-501)
Business Contingency Planning
כלי אבחון.
TRADE CREDIT INSURANCE
Must cost less than possible Impact
Security week 1 Introductions Class website Syllabus review
PLANNING A SECURE BASELINE INSTALLATION
SADC PPP Network PPPs in SADC
Presentation transcript:

Risk management Sebastian Bellagamba CABASE wwTLD meeting Mar Del Plata, 3 March 2005

Mar Del Plata, wwTLD meeting, 3 April 2005 Registry’s risk Administrative Financial Technical Physical

Mar Del Plata, wwTLD meeting, 3 April 2005 Administrative risks Contracts with registrars or registrants Transfer procedures Fake signatures Registration procedures …

Mar Del Plata, wwTLD meeting, 3 April 2005 Financial risks Overdue invoices Registrars bankruptcy Registry bankruptcy …

Mar Del Plata, wwTLD meeting, 3 April 2005 Technical risks Data corruption Loss of network connectivity Intrusion Disk failure Server failures Unreachable main website …

Mar Del Plata, wwTLD meeting, 3 April 2005 Physical risks Fire Earthquake Bomb Fiber cut Power failure …

Mar Del Plata, wwTLD meeting, 3 April 2005 Consequences on Registry’s activities Registrar Registrant Local Internet community

Mar Del Plata, wwTLD meeting, 3 April 2005 Strategies Diversify location and infrastructures Look for a proper insurance cover Run periodical checks on all the activities Learn from best practices …

Mar Del Plata, wwTLD meeting, 3 April 2005 Diversify location and infrastructures Maintain multiple locations Replicate data Keep qualified staff at each location Make sure that each location mitigates the primary risk at the other Back up power supply …

Mar Del Plata, wwTLD meeting, 3 April 2005 Insurance cover Insurance policies are not sufficient to cover all possible areas of weakness There could be problems related to the uncertainty of many activities They are only a part of a very well evaluated risk management process

Mar Del Plata, wwTLD meeting, 3 April 2005 Periodical checks They can help you to auto-evaluate possible risks and threats Preferably they should be conducted by an external panel of experts

Mar Del Plata, wwTLD meeting, 3 April 2005 Learn from best practices The grass is greener on the other side of the fence Share your fears and thoughts with other registries that might have already developed remedies and “contingency plans”

Mar Del Plata, wwTLD meeting, 3 April 2005 Thanks for your attention Sebastian Bellagamba CABASE wwTLD meeting Mar Del Plata, 3 March 2005