PROTECT Meeting #34 Paris

Slides:



Advertisements
Similar presentations
Koen Maris – The Human Factor in Information technology – Copyright 2005 – The Human Factor in Information Technology.
Advertisements

Completing the EU internal energy market
Effective Communication of Cyber Security Risks: Addressing the Human Element in Security Jason R.C. Nurse (PhD, MSc, BSc) Cyber Security Centre, Department.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Virus & Anti-Virus Itthiwat Phiphopsukhawadee M.2/7 No.5 Saranpat Prasertthum M.2/7 No.17 Korakrit Laotrakul M.2/7 No.23 Pesan Kasemkitjanuwat M.2/7 No.25.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
CSC-682 Advanced Computer Security Analyzing Websites for User-Visible Security Design Flaws Pompi Rotaru Based on an article by : Laura Falk, Atul Prakash,
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
Small Business Security Keith Slagle April 24, 2007.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Nikita Maria Department of Applied Informatics University of Macedonia - Greece.
IAEA International Atomic Energy Agency IAEA Training Course on Conducting Computer Security Assessments Presented by: Donald D. Dudenhoeffer.
Principles Identified - UK DfT -
Security Issues in Information Technology
Law Firm Data Security: What In-house Counsel Need to Know
March 2016 # UN-CEFACT / IPCSA / PROTECT meeting
INSPIRE and the role of Spatial Data Interest Communities (SDIC)
iSecurity Compliance with HIPAA
Three steps to prevent Malware infection
Cyber Security – An Existential Threat? (IIC, Singapore)
"Follow the money" and supply chain integrity
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Design for Security Pepper.
Data Minimization Framework
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Information Technology Sector
Public-private cooperation
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It works.
Failure to protect stored data
Cyber Security By: Pratik Gandhi.
Blockchain in maritime sector
The Future of Cyber Security
What is a Firewall Anyway?
Security of a Local Area Network
Security in Networking
RISK MANAGEMENT An Overview: NIPC Model
Traceability rules for explosives Applicability to goods in transit
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
I have many checklists: how do I get started with cyber security?
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Risk of the Internet At Home
Cyber attacks on Democratic processes
Chapter 19: Building Systems with Assurance
Payment Card Industry (PCI) Data Security Standard (DSS) Compliance
Awareness and enforcement of compliance with State aid rules
IS4680 Security Auditing for Compliance
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Chapter 9 E-Commerce Security and Fraud Protection
Module 5 The Climate Expert and your role as a consultant
Strengthening Early Warning Systems in Europe
IS4680 Security Auditing for Compliance
Cybersecurity Threats and Opportunities in Latin America
12 STEPS TO A GDPR AWARE NETWORK
Cybersecurity Am I concerned?
Implementing Client Security on Windows 2000 and Windows XP Level 150
Securing free and fair European elections
The Republic of Lithuania
How to keep the bad guys out and your data safe
Workshop Next steps for Equality Outcomes?
What is a Firewall Anyway?
PROTECT Group Meeting #37 Organization & Governance 6th November 2018.
Cyber Security in a Risk Management Framework
Cybersecurity and Cyberhygiene
Financial (cyber) Security
Conclusions from the Review of REACH
Challenges Of Network Security
Lecture 15: Cybersecurity management
Fy ‘08 NETWORK PLANNING TASK FORCE
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Presentation transcript:

PROTECT Meeting #34 Paris 29-30.06.2017 Bild im Folienlayout austauschbar Stephan Gund

Physical and Cyber-Security

Cybersecurity Cybersecurity Key Elements I: Process Integration: A strong focus on physical access, technical protocols, firewalls, general rules/standards, continuous process improvements, encryption and virus protection. Identification and Authorization: Access control is important when PCS acting as a trusted third party Alertness, Awareness and Education: Aware of data security issues. Focus on behaviour, education, enforcement and control. Monitoring, Traceability and Reporting: Stakeholders in the supply chain must constantly monitor their systems to eliminate any weaknesses or vulnerabilities. Reporting on different levels.

Cybersecurity Key Elements II: Attention of Data Protection Policy: EU Directive 2016/679 “General Data Protection Regulation” http://eur-lex.europa.eu/eli/reg/2016/679/oj All activities must be observed: A balance between security and usability. See also: IPCSA Publishes the Summary, Conclusions and Recommendations of its Cybersecurity Workshop from July 2015 http://www.epcsa.eu/news/2015-08-25-ipcsa-publishes-the-summary-conclusions-and-recommendations-of-its-cybersecurity-workshop

Fatal Error Occured: You are infected, Virus detected !!! Blue Screen of Death: A problem has been detected and windows has been shut down to prevent damage to your computer. The problem seems to caused by a member of the PROTECT Group Technical information: *** STOP 0x0000123456 DATE 29-JUNE-2017 *** STEPHAN GUND @ Location: Paris HAROPA Port of LE HAVRE Jboss 7 Umstellung Windows

Don’t worry & Don't forget: Not every thing is real in our business ! Cybersecurity Don’t worry & Don't forget: Not every thing is real in our business ! Thanks for your attention Further Questions? Please refer to: Stephan Gund DAKOSY Datenkommunikationssystem AG, Telefon: +49 / 40 / 37 00 3 – 0, E-Mail: gund@dakosy.de