NATO Information Assurance

Slides:



Advertisements
Similar presentations
CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Advertisements

THE BUSINESS NEED Create affordable alternative/ provide enterprise power/capability for any-sized company Reduce resource-draining burden of meeting.
Mr. Mark S. Loepker Colonel Enrico Bologna SC/4 Co-Chairmen
NATO UNCLASSIFIED NATO Consultation, Command and Control Agency How to Do Business with NATO Mr. Tom Herway Chief of Contracts 15 June 2006.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
ACG 6415 SPRING 2012 KRISTIN DONOVAN & BETH WILDMAN IT Security Frameworks.
1 Defining System Security Policies. 2 Module - Defining System Security Policies ♦ Overview An important aspect of Network management is to protect your.
NATO CIS Services Agency TechNet International Keynote Speech Session I – International Threats – Regional Solutions Presented by Lieutenant General.
SECURITATEA SISTEMELOR INFORMATICE ŞI DE COMUNICAŢII Bucharest, September, 21, 2004 ATHENEE PALACE HILTON, Sala Le Diplomate Quo Vadis Information Security.
NATO CIS Services Agency Interoperability in Afghanistan The perspective of NCSA The ISAF CIS Coordinator and Service Provider Dag Wilhelmsen Technical.
Information Security Policies and Standards
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
NATO Network Enabled Capabilities
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Chapter 7 HARDENING SERVERS.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Lesson 1-What Is Information Security?. Overview History of security. Security as a process.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
1 Integrating ISA Server and Exchange Server. 2 How works.
5205 – IT Service Delivery and Support
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
S.ICZ Frantisek Vosejpka The enforcement of NATO INFOSEC requirements into the policy and architecture of CISs CATE 2003 Brno,
Security of Communication & IT systems Bucharest, 21 st September 2004 Stephen McGibbon Chief Technology Officer, Eastern Europe, Russia & CIS Senior Director,
Directory and File Transfer Services Chapter 7. Learning Objectives Explain benefits offered by centralized enterprise directory services such as LDAP.
Air Force Association (AFA) 1. 1.Access Control 2.Four Steps to Access 3.How Does it Work? 4.User and Guest Accounts 5.Administrator Accounts 6.Threat.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Copyright © 2016 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
PRESENTATION OF ETSI © ETSI All rights reserved Sophia Antipolis, 22 May 2014 Luis Jorge Romero Director General, ETSI.
MnSCU Audit Reports Presentation to the MnSCU Audit Committee Office of the Legislative Auditor September 21, 2004.
Unify and Simplify: Security Management
Protective Measures at NATO Headquarters Ian Davis Head, Information Systems Service NATO Headquarters Brussels, Belgium.
1 NATO HQ C 3 Staff The NATO HQ need for the Web: How policy requirements are affected by the need to take web development into account Georges D’hollander.
Review of NWS IT Consolidation Efforts For HIC Meeting July 2006 Tom Schwein Team Leader of Desktop Management Tiger Team SOD CRH.
Director NCSA 22/04/2017 “Running NATO’s Networks in Operations” LtGen Ulrich Wolf Director NCSA AFCEA Europe Symposium SHAPE 1 June 2006 Good morning,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Information Assurance Program Manager U.S. Army Europe and Seventh Army Information Assurance in Large-Scale Practice International Scientific NATO PfP/PWP.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Data Security Assessment and Prevention AD660 – Databases, Security, and Web Technologies Marcus Goncalves Spring 2013.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Initial Tiger Team Briefing New Dells with TPM Peter Leight Richard Hammer May 2006.
Information Security What is Information Security?
Training and Dissemination Enabling Grids for E-sciencE Jinny Chien, ASGC 1 Training and Dissemination Jinny Chien Academia Sinica Grid.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
NATO UNCLASSIFIED NATO Consultation, Command and Control Agency Acquisition Overview Mr. John D. Edell Director of Acquisition 15 June 2006.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY Welcome to Introduction to Network Security! Course Name – IT Introduction to Network Security.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
NATO OTAN US MILITARY REPRESENTATIVE TO NATO Information Exchange In Coalition Operations “From Guarding to Sharing” 1 June 2006 LtGen Ed Hanlon, USMC.
Eurostat ESS Security and Secure exchange of information Expert Group (E4SWG) Report of the activity of the Task Force in 2015 Pascal Jacques ESTAT B0.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Access Control for Security Management BY: CONNOR TYGER.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
Cybersecurity - What’s Next? June 2017
Team 4 – Mack, Josh, Felicia, Kevin and Walter
Identity & Access Management
HIMSS National Conference New Orleans Convention Center
In the attack index…what number is your Company?
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

NATO Information Assurance 5 June 2009 AFCEA TechNet Europe 2009 A NATO view of the application of Information Assurance Techniques

Outline NC3 Organization NCSA NATO Information Assurance Identity Management

SERVICES AGENCY (NCSA) NC3 Organization NC3 Organisation NATO C3 Agency (NC3A) SACEUR NATO C3 Board (NC3 Board) NC3 Reps NATO CIS SERVICES AGENCY (NCSA)

NCSA Mission To ensure the provision of secure end-to-end information exchange services and information processing services required for NATO Consultation, Command and Control, using fielded Communications and Information Systems in the most cost effective manner.

Current NCSA Structure NCSA HQ MONS NCISS Latina Brunssum Sector Norfolk Sector Mons Sector Naples Sector Lisbon Sector Madrid Sector Ramstein Sector Izmir Sector Heidelberg Sector Northwood Sector 1 NATO Signal Bn Maastricht 2 NATO Signal Bn Naples Total PE: ~ 3300 Deployable

NCSA Areas of Responsibility US CA Norfolk Sector Mons Sector Brunssum Sector (includes CLD-B) Naples Sector (includes CLD-N) Northwood Sector Madrid Sector Lisbon Sector Izmir Sector Heidelberg Sector and Ramstein Sector without assigned AOR SP PO FR BE Lux. NL. GE PL CZ. IT GR TU HU NO UK IC SI SZ LH LG EN RO BU EUFOR KFOR ISAF IRAQ

INFOSEC -> IA NATO definition NNEC enabler Risk management Strong authentication

SMI Services Identity management Credential management Attribute management Privilege management Digital policy mangement

SMI Services IA configuration management Crypto key management IA metadata management IA audit managment

NATO Identity Management EAPC(AC/322-SC/5-WG/5)WP(2009)0001 NATO Identity Management (NIdM) AC/322-D(2005)0044 INFOSEC Technical And Implementation Guidance On Identification and Authentication AC/322-D(2004)0024REV2 NATO Public Key Infrastructure (NPKI) Certificate Policy (CertP) Rev2

NATO Identity Management Passwords Tokens Biometrics

NPKI Information sharing Effects-based approach Improved decision making Physical access control

NPKI Today Office Communication Suite (OCS) NATO Restricted (NR) network NEKMS

NATO Information Assurance Email Content Checking Mail guards OS/applications security settings Forensic capability Security event management IDS Firewalls Anti-virus software

IA Threats Spam Malware Web defacements User indiscretions Targeted attacks Classified information leakage Vulnerabilities exposed by poor maintenance System privilege abuse

IA Future Increased capacity Smarter tools Centralized management Consolidated IA picture Faster reaction

Conclusion Speed up Cooperate closely Do not forget the human factor Flexibility and mobility

Questions?