Statistics Canada1 Statistics Canada’s strategic approach to IT Security OECD Conference on IT Security Paris, April 19th and 20th, 2001 Dave Venables.

Slides:



Advertisements
Similar presentations
Darton College Information Systems Use Policies. Introduction Dartons Information Systems are critical resources. The Information Systems Use Policies.
Advertisements

USG INFORMATION SECURITY PROGRAM AUDIT: ACHIEVING SUCCESSFUL AUDIT OUTCOMES Cara King Senior IT Auditor, OIAC.
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
Some general principles in computer security Tomasz Bilski Chair of Control, Robotics and Computer Science Poznań University.
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
Secure Computing Network
Security Controls – What Works
Security+ Guide to Network Security Fundamentals
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Payment Card Industry (PCI) Data Security Standard
Addressing Information Security at Heller October 16, 2013 secureHeller.
Macintosh Configuration Management Will Jorgensen 1.
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Morris Bennett Altman Director of Network Services Internet Security Officer Queens College, CUNY Are You Exposed? Network Security.
Customized solutions. Keep It Secure Contents  Protection objectives  Endpoint and server software  Protection.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Your technology solution partner.™ Security Enterprise Protection Gener C. Tongco Product Manager CT Link Systems Inc.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Protecting ICT Systems
Program Objective Security Basics
INFORMATION SECURITY THE NEXT GENERATION 13 th World Electronics Forum Israel Christopher Joscelyne Board Member & Membership Chairman AEEMA November 2007.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
Information Security OECD, April 2001 International Computing Centre Managing Information Security Ed Gelbstein, International Computing Centre, Geneva.
PROJECT PAPER ON BLUEFIRE MOBILE SECURITY. BY PONNURU VENKATA DINESH KUMAR STUDENT ID # A0815 PROFESSOR – VICKY HSU CS-426.
Overview Of Information Security Management By BM RAO Senior Technical Director National Informatics Centre Ministry of Communications and Information.
Surviving in a hostile world  The myth of fortress applications  Tomas Olovsson CTO, Appgate Professor at Goteborg University, Sweden.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Managing and Securing Endpoints Bruce Hotte Chief Information Officer Jeff Swan Network Supervisor  The definition of “endpoint” used to be simple: a.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
Group 2: Marco Hidalgo Wesley Lao Michelle Marquez-Lim
Chapter 6 of the Executive Guide manual Technology.
Safeguarding OECD Information Assets Frédéric CHALLAL Head, Systems Engineering Team OECD.
The ProactiveWatch Monitoring Service. Are These Problems For You? Your business gets disrupted when your IT environment has issues Your employee and.
Managing Information System Security: Principles GP Dhillon Associate Professor Virginia Commonwealth University.
ACM 511 Introduction to Computer Networks. Computer Networks.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
Data Security Overview. Data Security Periphery –Firewalls –Web Filtering –Intrusion Detection & Prevention Internal –Virus Protection –Anti Spy-ware.
Managing Security Risks in the Federal Reserve System Marianne Emerson, Deputy Director Information Technology Division Board of Governors of the Federal.
Completing network setup. INTRODUCTION Course Overview Course Objectives.
INTERNET SECURITY - An Introduction. Internet Security Security  Security is a ‘Hygiene Factor’  When there, noone should notice  When not there, can.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Converting Policy to Reality Designing an IT Security Program for Your Campus 2 nd Annual Conference on Technology and Standards May 3, 2005 Jacqueline.
Module 11: Designing Security for Network Perimeters.
Network Security & Accounting
IT Security Policies and Campus Networks The dilemma of translating good security policies to practical campus networking Sara McAneney IT Security Officer.
Security fundamentals Topic 10 Securing the network perimeter.
Security Environment Assessment. Outline  Overview  Key Sources and Participants  General Findings  Policy / Procedures  Host Systems  Network Components.
Part V Electronic Commerce Security Online Security Issues Overview Managing Risk Computer Security Classifications. Security.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
© 2013 Toshiba Corporation B2B PC Training Mailer - Toshiba Device Access Control.
Information Security tools for records managers Frank Rankin.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Incident Response Strategy and Implementation Anthony J. Scaturro University IT Security Officer September 22, 2004.
Documents. Process. Data. Payables
CHALLENGES Users growing and becoming more demanding
IT Vocab IT = information technology Server Client or host
ISMS Information Security Management System
12 STEPS TO A GDPR AWARE NETWORK
Contact Center Security Strategies
Implementing Client Security on Windows 2000 and Windows XP Level 150
Fy ‘08 NETWORK PLANNING TASK FORCE
Presentation transcript:

Statistics Canada1 Statistics Canada’s strategic approach to IT Security OECD Conference on IT Security Paris, April 19th and 20th, 2001 Dave Venables Director, Informatics Technology Services Division Statistics Canada (613)

Statistics Canada2 Overview Business requirements Threats Overall strategy Tactics Challenges Summary

Statistics Canada3 Character Organisational Character Statistics Canada comprises: –5100 employees at Headquarters –650 employees in 9 Regional Offices –1200 interviewers in the Regions Informatics is integral to our business: –850 IT Staff, 400 in Central Informatics –7,000 workstations; 300 Servers; 1 Mainframe Strong corporate culture –Security

Statistics Canada4 Business requirements Maintain respondent confidence Protect respondent confidentiality Preserve data integrity Ensure data availability Facilitate data accessibility Support ongoing operations

Statistics Canada5 Threats Unauthorised disclosure –Data collection –Collected micro-data and Published data Authentication –Collection and Access Accessibility –denial of service Viruses –known, variants and unknown

Statistics Canada6 Overall Strategy Centrally managed infrastructure Dual Network Prevention Proactive Balance operational flexibility with safeguards

Statistics Canada7 Tactics Dual network with air gap –Internal network (A) for confidential data –External network (B) for published data –Robotic A/B switch –Manual A/B switch Firewall with hardened OS Automatic encryption –between HQ, RO and interviewers

Statistics Canada8 Tactics Interviewer Laptop - full disk encryption Internal access controls Token based remote access Anti-virus desktop software Anti-virus software at firewall Attribute checking of at firewall Inbound overnight mail queued

Statistics Canada9 Tactics Oath Clear security policy Clear security practices Proactive security awareness program Regular automated policy reminder Proactive entry attempts

Statistics Canada10 Challenges Full disk encryption for all laptops Increased electronic data reporting External data research centres Virus detection for encrypted information Wireless technology PDAs Other new technology

Statistics Canada11 Summary Strong security culture Some operational inconvenience Room for improvement Continual reassessment High respondent confidence High level of protection

Statistics Canada12 Schematic