1 Secure Interoperability within the Defence Supply Chain Colin Nash – Business Development Manager Thursday 28 th October 2010.

Slides:



Advertisements
Similar presentations
Introduction to Planets Hans Hofman Nationaal Archief Netherlands Prague, 17 October 2008.
Advertisements

Coalition Warrior Interoperability Demonstrator
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Practical Digital Signature Issues. Paving the way and new opportunities. Juan Carlos Cruellas – DSS-X co-chair Stefan Drees - DSS-X.
Common Assessment Framework for Adults Demonstrator Site Programme Event to Support Expressions of Interest.
PAGE 2 | CONFIDENTIAL | TSCP| Aerospace & Defense Industry Challenges Customer Lead Contractor Manufacturing Subcontractor Manufacturing & Design Subcontractor.
Extending ForeFront beyond the limit TMGUAG ISAIAG AG Security Suite.
Securing Corporate & Documents Richard Elphick Titus Labs.
Towards an ‘easy office’ : ICT and Telecom : a Lovestory ! Michel De Maeyer Marketing Manager Small Business Customers.
All rights reserved © 2005, Alcatel Risk Awareness in Enterprise IT Processes and Networks  Dr. Stephan Rupp.
The U.S. Federal PKI and the Federal Bridge Certification Authority
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
Understanding Active Directory
Preservation and Long-term access through Networked Services Adam Farquhar, The British Library iPres2006 Cornell University, October 2006.
Information Networking Security and Assurance Lab National Chung Cheng University Guidelines on Electronic Mail Security
Introduction to PKI Mark Franklin September 10, 2003 Dartmouth College PKI Lab.
Community Advocacy Function GIFAS Presentation TSCP presentation to the GIFAS 9 th May 2007 Prepared by Marc Speltens, TSCP Outreach director.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
E-Government Security and necessary Infrastructures Dimitrios Lekkas Dept. of Systems and Products Design Engineering University of the Aegean
Connect – Mersey Care NHS Trust & SCC Knowledge Driven Health.
CAMP - June 4-6, Copyright Statement Copyright Robert J. Brentrup and Mark J. Franklin This work is the intellectual property of the authors.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
The Crown and Suppliers: A New Way of Working People & Security15:35 – 16:20 Channels & Citizen Engagement Social Media ICT Capability Risk Management.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
VDA Security Services Freeware Libraries Update IETF S/MIME WG 29 March 2000 John Pawling J.G. Van Dyke & Associates (VDA), Inc;
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
SHASHANK MASHETTY security. Introduction Electronic mail most commonly referred to as or e- mail. Electronic mail is one of the most commonly.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
CensorNet Ltd An introduction to CensorNet Mailsafe Presented by: XXXXXXXX Product Manager Tel: XXXXXXXXXXXXX.
Presentation to the Housing Technology Conference Tim Cowland- Senior Consultant 27 th February 2014 The Rise of the Housing Cloud.
Best Practices in Deploying a PKI Solution BIEN Nguyen Thanh Product Consultant – M.Tech Vietnam
Cartes America - Secure ID: Fraud and ID Management Part 1 Track Personal Identity Verification (PIV) Case Study within the TSCP Community Keith Ward TSCP.
1 PKI Update September 2002 CSG Meeting Jim Jokl
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Deploying PKI Inside Microsoft The experience of Microsoft in deploying its own corporate PKI Published: December 2003.
Report Prepared for Envision Presented by: Kristen Vargas Rossana Figuera Yinka Osidein.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Trusted Federated Identity and Access Management to provide the Cornerstone for Cyber Defense.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
© 2009 WatchGuard Technologies WatchGuard Encryption Subscription Ensuring Privacy and Compliance of Messages.
Digital Signatures A Brief Overview by Tim Sigmon April, 2001.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Shibboleth: An Introduction
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
Module 12 Integrating Exchange Server 2010 with Other Messaging Systems.
QUALITY. QUALIDOC Web site: Telephone: 44+ (0) JEAN WHITE.
1 MISA Model Douglas Petry Manager Information Security Architecture Methodist Health System Managed Information Security.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Mariann Yeager, NHIN Policy and Governance Lead (Contractor) Office of the National Coordinator for Health IT David Riley, CONNECT Lead (Contractor) Federal.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
1 Margaret Christison Head of Product Data Standards Product Information Standards Defence Logistics 2004.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
Copyright Statement Copyright Robert J. Brentrup This work is the intellectual property of the author. Permission is granted for this material to.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter One Introduction to Exchange Server 2003.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1 Copyright © Deep-Secure Ltd This presentation cannot be modified or re-used without prior permission The information included herein is confidential.
Trade Associations R&D / Academia Pan- Govern- ment Membership organisation & trusted Forum for Team Defence UKCeB UKCeB provides: Coherence Common Solutions.
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
July 19, Secure Messaging Models Co-existence and Interoperability Russell W. Chung New York, NY July 19, 2005.
S/MIME T ANANDHAN.
9/14/2018 2:22 AM THR2026 Set up secure and efficient collaboration for your organization with Office 365 Joe Davies Senior Content Developer Brenda Carter.
Encryption in Office 365 Shobhit Sahay Technical Product Manager
The People Ready Vision for Business in the Enterprise
Presentation transcript:

1 Secure Interoperability within the Defence Supply Chain Colin Nash – Business Development Manager Thursday 28 th October 2010

Introduction How Deep-Secure have used the Transglobal Secure Collaboration Programme (TSCP) specification to enable interoperability within the Defence Supply Chain. The UK MOD sponsored the demonstration of secure information exchange in the supply chain at CWID 2010 –Based on a Deep-Secure interoperability demonstration incorporating BAE Systems and TSCP (CertiPath) –Helping to understand applicability of the solutions to enable better sharing of information between MOD and supply chain organisations 2

Secure Interoperability within the Defence Supply Chain The aim of TSCP is provide a secure means of exchanging information between Aerospace and Defence Companies and the Government Organisations they deal with, such as UK MOD, US DOD and NL MOD This is achieved through the adoption of common standards for secure and document labelling Deep-Secure is a Silver Member of TSCP 33 Deep-Secure Mail Guard

Aim of the CWID 10 Trial  To demonstrate secure messaging capabilities using the TSCP specification  Enabled by the Deep-Secure Mail and Directory Guard  Configured for:  Encryption and Decryption of SMIME messages  Secure Storage of certificates  Organisational security policy enforcement  Virus scanning  Content Analysis  Release Control  Label checking and transformation  Certificate LDAP Lookup 4

CWID Architecture 5

PKI Cross Certification 6

7

8 Preparation

MOD User finding external user encryption certificate 9

MOD User Sending encrypted to an external user 10

11 Receipt and Verification (Bolden James)

12 Receipt and Verification (Titus Labs)

TSCP Secure v1Demo 13

TSCP Secure v2 Demo 14

Summary By adopting common standards this approach allows members of the Supply Chain community to: –Securely Collaborate with partners Assured enforcement of consistent Security Policies Controlled release of information with strong message checking Enhanced security with the use of desktop encryption Adoption of Federated Identity and Access Management Integration of Public Key Infrastructure –Reduce risk Data loss, Export Control transgressions, IPR breaches –Improve efficiency Reduce cost for delivery and operational support Improve and align with the tempo of operations 15

Booth Demonstration Architecture Secure , Web and Chat 16

Thanks to Supporting Companies 17

18 Key Contacts Deep-Secure Limited 1 Nimrod House Sandy’s Road Malvern Worcestershire WR14 1JJ +44 (0) Colin Nash Business Development Manager Telephone: +44 (0) Robin King Head of Sales and Marketing Telephone: +44 (0)