The Queen’s University of Belfast JISC BS7799 Pilot The Queen’s University of Belfast Dr. Ricky Rankin.

Slides:



Advertisements
Similar presentations
HIPAA Security Presentation to The American Hospital Association Dianne Faup Office of HIPAA Standards November 5, 2003.
Advertisements

Computer Emergency Response Teams
Child Safeguarding Standards
Cyber Security & Critical Controls Chris Few Industry Enabling Services CESG February 2011 © Crown Copyright. All rights reserved.
Software Quality Assurance Plan
Discovery – The Next Generation!: Business Context of Risk Presentation to the North London Branch British Computer Society 19 March, 2008 Dr. Victoria.
DHS, National Cyber Security Division Overview
By Eileen Clegg Digital Preservation at Columbia in the Old Days (2009)
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
April 3-5, 2005Security Professionals Conference Ways to Fit Security Risk Management to Your Environment Using the OCTAVE Methodology Tailoring.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Copyright © 2007 EDWARD DEVLIN, Crisis Management By: Dr. Sara Jeza Alotaibi 1 Chapter 2 Business Continuity Planning: What Is It?
Qualifications / Courses Level Probationary Correctional Officer / OverseerFirst Class Correctional Officer Accredited And Non-accredited Courses Senior.
1 CHCOHS312A Follow safety procedures for direct care work.
Copyright 2010, The World Bank Group. All Rights Reserved. Agricultural Coding and Data Processing Section B 1.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Evolving IT Framework Standards (Compliance and IT)
What is Next-Generation Disaster Recovery and Service Availability? Why do We Need it? Dan Smith Senior Manager, Solution Consulting and Engineering, GTSI.
Resources to Support Training Programs for CSIRTs.
Keeping you Running Part I Experiences in Helping Local Governments Develop Cyber Security and Continuity Plans and Procedures Stan France & Mary Ball.
David N. Wozei Systems Administrator, IT Auditor.
How to evaluate ICT use for small organisations Session 2.
Impact Development in IT have had a major impact on the way organisations operate. Few organisations are able to survive in a competitive market without.
Information Systems Security Operational Control for Information Security.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Risk Assessment and Management. Objective To enable an organisation mission accomplishment, by better securing the IT systems that store, process, or.
Celebrate, Recognize and Reporting to Others. “We make a living by “We make a living by what we do, but we what we do, but we make a life by what make.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Lesson 7-Managing Risk. Overview Defining risk. Identifying the risk to an organization. Measuring risk.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
The UKs Number One! “Treating Customers Fairly” Stuart Johnson Head of Distribution.
ISS SiteProtector and Internet Scanner LanAdmin Group Meeting 12/8/2005.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Introductions. Emergency Planning Emergency Management & Preparedness Street Smarts Version.
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
New A.M. Best Cyber Questionnaire
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 1 Security Architecture.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Author(s): Don M. Blumenthal, 2010 License: Unless otherwise noted, this material is made available under the terms of the Attribution – Non-commercial.
Making the System Operational Implementation & Deployment
 How well is your organisation prepared for internal or external emergency situations? ◦ Do you consult with relevant emergency agencies? ◦ Do you.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
Computer Policy and Security Report to Faculty Council Jeanne Smythe ATN Director for Computing Policy March 26,2004.
IT Security CS5493(74293). IT Security Q: Why do you need security? A: To protect assets.
1 Certification and Accreditation CS Unit 4:RISK MANAGEMENT Jesus Gonzalez Kalpana Bahunoothula Jocelyne Farah.
Interoperability Conformance Testing Bela Berci/Denise Bagnell/Phil Robson October 03, 2003.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
Win Phillips, Ph.D Win Phillips, Ph.D. Clinical Assistant Professor University of Missouri Columbia, MO.
Internal Audit Agency Integrity + Professionalism INTERNAL AUDIT AGENCY ISACA Presentation 15 July, 2013 Alisa Hotel, ACCRA.
Department of Computer Science Introduction to Information Security Chapter 7 Activity Security Assessment Semester 1.
Welcome to the ICT Department Unit 3_5 Security Policies.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Responding to Intrusions
Business Continuity Plan Training
APPLICATION RISK AND CONTROLS
Fujitsu Service Portfolio for SAP IT Infrastructures
A Thread Relevant to all Levels of the EA Cube
I have many checklists: how do I get started with cyber security?
Fujitsu Service Portfolio for SAP IT Infrastructures
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Making the System Operational Implementation & Deployment
IT & Security Training Skills.
Security week 1 Introductions Class website Syllabus review
Curriculum Coordinator: Sophia Theodore Date of Presentation: 1/15/16
Presentation transcript:

The Queen’s University of Belfast JISC BS7799 Pilot The Queen’s University of Belfast Dr. Ricky Rankin

The Queen’s University of Belfast JISC BS7799 Pilot Outline  Reasons for Joining Pilot  BS7799 at Queen’s  Next Steps  JISC Assistance

The Queen’s University of Belfast JISC BS7799 Pilot Reasons for Joining Pilot  Our Systems are constantly under threat  what is the degree of risk  If/when attacked  how to assess damage to reputation  what effort is required to restore systems  what effort is required to track hacker  BS7799  emerging information security standard

The Queen’s University of Belfast JISC BS7799 Pilot BS7799 at Queen’s  Computing Systems and Infrastructure only  Completed Questionnaire  all sections not relevant to everyone  better response to shorter version  excellent check list for what should be done  Accreditation

The Queen’s University of Belfast JISC BS7799 Pilot Procedures in Practice

The Queen’s University of Belfast JISC BS7799 Pilot BS7799 Next Steps  Self Assessment  Integrate with JISC IS Strategy  Distribute information from UKERNA CERT Group  Balance Security Risk  what is being secured systems/information/reputation  what is the cost time/hardware/software/training

The Queen’s University of Belfast JISC BS7799 Pilot JISC Assistance Needed  Risk Assessment  Legal Advice  data protection act  copyright  acceptable use  How to Measure Progress  Briefings to Senior Management