Israel Securities Authority MAGNA – Electronic filing Natan Herscovitz, CIO December 2004.

Slides:



Advertisements
Similar presentations
ASYCUDA Overview … a summary of the objectives of ASYCUDA implementation projects and features of the software for the Customs computer system.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Installation & User Guide
Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
Digital Certificate Installation & User Guide For Class-2 Certificates.
1. Intro What is PremiumAV? Antivirus engine Features of PremiumAV. Classification of PremiumAV. PremiumAV LAB Re-Branding or Private Label Why Re- Branding.
A presentation on e-Procurement
Chapter Twelve Financial Reporting and the Securities and Exchange Commission Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction.
“...creating knowledge.” Enabling Digital Content Protection on Super-Distribution Models - Carlos Serrão ISCTE – Intituto Superior.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Security Controls – What Works
Implementation of XBRL at the Israel Securities Authority December 3-6, 2007 Vancouver, British Columbia, Canada.
02/12/00 E-Business Architecture
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Chapter 10 Information Systems Management. Agenda Information Systems Department Plan the Use of IT Manage Computing Infrastructure Manage Enterprise.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
INTRODUCTION Toomeeting Conference (TMC) is the easiest and more accessible multimedia videoconferencing solution on market. TMC offers a large portfolio.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
XBRL regulatory reporting to the Securities Commission of Spain José M. Alonso Comisión Nacional del Mercado de Valores (CNMV)
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
INTRANETS DEFINITION (from Cambridge International Dictionary of English) intra- Combining form used to form adjectives meaning 'within' (the stated place.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Forefront Security Exchange. Problem Meddelande system och sammarbetsprodukter är underbarar mål för elak kod och “distrubition” av äkta dynga… Viruses.
Office 365: Efficient Cloud Solutions Wednesday March 12, 9AM Chaz Vossburg / Gabe Laushbaugh.
Chapter 5 Application Software.
Integrate your people maximize your knowledge Tel SalesBase Customer.
Deploying a Certification Authority for Networks Security Prof. Dr. VICTOR-VALERIU PATRICIU Cdor.Prof. Dr. AUREL SERB Computer Engineering Department Military.
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
Lecture 12 Electronic Business (MGT-485). Recap – Lecture 11 E-Commerce Security Environment Security Threats in E-commerce Technology Solutions.
Moscow, 2007 OKB SAPR Information Security Policy that Accords Protection OKB SAPR Special Design Bureau for Computer-Aided Design
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
Securing Information Systems
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
© Paradigm Publishing, Inc. 5-1 Chapter 5 Application Software Chapter 5 Application Software.
Concepts of Database Management Sixth Edition
Disaster Recovery Strategies & criteria for evaluation of information management strategies.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
SODA Archiving October 2013
E-commerce Vocabulary Terms. E-commerce Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the Internet.
E-commerce Vocabulary Terms By: Laura Kinchen. Buying and selling of goods, services, or information via World Wide Web, , or other pathways on the.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Logo Add Your Company Slogan China Financial Certification Authority Third-party certification authority Team 13 :吉露露、吴莹莹、潘韦韦 ( CFCA )
GPO’s Federal Digital System August 17, 2010 U.S. Government Printing Office.
OEI’s Services Portfolio December 13, 2007 Draft / Working Concepts.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
© Paradigm Publishing Inc. 5-1 Chapter 5 Application Software.
Copyright © cs-tutorial.com. Overview Introduction Architecture Implementation Evaluation.
SESSION 14 INFORMATION SYSTEMS SECURITY AND CONTROL.
By Umair Ali. Dec 2004Version 1 -PKI - a security architecture – over the internet. -Provides an increased level of confidence for exchanging information.
Chapter 2 Securing Network Server and User Workstations.
COSC 513 Operating Systems Project Presentation: Internet Security Instructor: Dr. Anvari Student: Ying Zhou Spring 2003.
DIGITAL SIGNATURE.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
A STRONG ENABLER. Global Quality Benchmarks Global Quality Benchmarks Free Competition Free Competition Speed of Service Speed of Service Increased Transparency.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Copyright © 2007 Pearson Education Canada 23-1 Chapter 23: Using Advanced Skills.
Digital Security Jesline James! 9cc. Contents  The CREATORS!!!! =] The CREATORS!!!! =]  What is Digital Security? What is Digital Security?  How does.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
- 1 - Dual Listing Combining the advantages of local and global markets January 2007 Ester Levanon, CEO.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
INFORMATION SYSTEMS SECURITY and CONTROL
ONLINE SECURE DATA SERVICE
Security Insights: Secure Messaging
Presentation transcript:

Israel Securities Authority MAGNA – Electronic filing Natan Herscovitz, CIO December 2004

 Internet site:  Enforcement system: investigations and intelligence  Stock Exchange activity monitoring  GroupWare system  Electronic filing system Main computerization projects

 Establish a computerized system to receive and distribute, via the Internet, all reports required from the bodies supervised by the Securities Authority.  Main goal: to enhance investors’ confidence and encourage capital market investments Electronic Filing Project

 Prompt report publication, free of delays  Equal publication: information is accessible to the general public  The electronic report is the legally original document, not only a representation  Establish an archive system that stores documents indefinitely  Enable complete data retrieval according to a large variety of criteria  Enable queries and reports – a unique, sophisticated feature Filing System Goals

 Receive non-public reports for internal ISA use  Fully automatic distribution to Tel- Aviv Stock Exchange and various commercial information distributors  Uniform and standardized reporting  Very significant cost reduction for companies Filing System Goals

Architecture Reporting bodies Public Stock Exchange Reporting Site Electronic filing Information System (MAGNA) Distribution Site Securities Authority Information Systems Document Management System GroupWare Forms Reports Docs Data Docs Data Docs Received Docs Data Data Security

 Large amount of data: General project characteristics financial reports immediate reports transactions with controlling shareholders private placements acquisitions  Forms for companies, investment advisors and portfolio managers  In total, hundreds of thousands of report pages per year private placements Prospectuses Change of holdings Tender offers

 Thousands of reporting bodies, throughout Israel, with several persons in each appointed to fill reports  Short schedule: approximately one year to set up the system from kickoff to full production  Extensive integration and tutoring project  Service offices for assistance in reporting  Help Desk providing user support by phone General project characteristics

 Some of the world’s most advanced technologies, never used in any computer system before  Complex interfaces to internal and external systems  Advanced procedures: Individually tailored report forms: reporting body identification and data downloads Report type identification Report fields Identification Sent reports are encoded and signed Completeness testing Service offices Project Characteristics — Software Development

 Availability and reliability:  99.95% up time  No Single Point Of Failure  Computer room organization  DRP: Disaster Recovery Plan  Alternative site in case of crash or disaster, located in another city  Unique control & management system for hardware, software and business process control Project Characteristics — Hardware and Communications

 System must provide: Identification Authentication Non-Repudiation Non-Disclosure Protection against intrusion Protection from viruses and vandals Protection of internal ISA information systems Interface protection Project Characteristics — Required Data Security

 Solutions used to achieve the above requirements: PKI (Public Key Infrastructure) Technologies Use of external and independent Certification Authority, approved by law Use of USB Token as a cryptographic device Use of GAP technology for physical separation as part of the PKI authentication process, including content inspection Software security Firewalls by various vendors Intrusion detection packages Anti-Virus software Security control and management system Project Characteristics — Data Security solutions

 Getting underway Registration Integration Fully operational since Nov. 16 th 2003  Further stages: Funds and investment counsel Red flags Electronic Filing Project