Download presentation
Presentation is loading. Please wait.
Published byOctavia Singleton Modified over 9 years ago
1
The extremes are attracting each other Calin Rangu 25 st of May, 2009 Cyber-security Conference Bucharest
2
Agenda History and Present: IIRUC Service and R-IT Cyber-security : the real dimension The public-private partnership Cyber-security centers – integrated universe Proposed measures and standards What IIRUC Service can do?
3
History and Present 1968: the original IIRUC company was established 1991: IIRUC-SA was registered as a shareholding company out of the original IIRUC company 2004: IIRUC SERVICE SA was established, based on the traditional IIRUC SA company 2008 (February): Raiffeisen Informatik Austria (R-IT), the second largest IT service provider in Austria, achieved the sole control over IIRUC SERVICE SA 2008 (October): Approval of the Master Plan for the company development 2008 (October): Opening new Headquarter with a Data Center facility and a central Call Center dept. 2009 (January): The set-up of the IT security business line – global partnerships and product related services 2009 (June) – Professional and IT Security Operations related services Raiffeisen Informatik Group 2009’s turnover: Over 1 billions EURO
4
IIRUC Service means : Over 25,000 customers Over 70,000 equipment in service East-Europe competence hub Running international projects (Ukraina, CEE) Multiple certifications 350 employees 120 cars fleet 60 nationwide locations in 8 areas 47 nationwide stores 50 service laboratories 1 national training center
5
IT Operations Outsourcing Security Services Software Solutions Output Services Client Management Raiffeisen Informatik Offered IT Services, strategical vision for Romanian market 3.000 Server 20.000 Corporate Clients All highway system in Austria 320 local communities 28 hospitals 25 banks 40.000 km Network 520 TB Storage 1 Billion Transactions p.a. 300 Mio. printed Pages p.a. Several Data Centers
6
Cyber Security – the real dimension of the problem The Cybersecurity Act of 2009 of USA, proposed in late March, starts with the assessment:Cybersecurity Act of 2009 "The Congress finds the following: (1) America's failure to protect cyberspace is one of the most urgent national security problems facing the country." The situation: confused atmosphere about cyber-security. States need help passing security tests, yet the government is drawn to the big problem of securing the Internet. The declaration: the importance of the Internet as an infrastructure to our economy and society and the inability of the private sector to solve cyber- security problems
7
The government is always hopelessly behind the private sector in technology. But in front of all are there the cyber-bad-guys. There are better ways for the public sector to complement the private sector. Open networking and connectivity - vulnerabilities in computer systems. Too much legislative dialog around corporate responsibilities. It may be far more effective to involve the service provider utilities as part of the solution. The initiative for a national identity and authentication service and its large civil liberties implications is a discussion that should be conducted at the highest levels. The real dimension of the problem
8
The Internet has brought unparalleled positive change in our lives -- the security reality is far different from the hype. In past the changes due to adoption of the telephone, television or transportation network that has worked without security oversight - security incidents have been far short of catastrophic. Private industry knows how to build in business resiliency, indemnify consumers, and allocate new technologies to reduce risk. The government can learn about managing risk from private enterprises and should avoid rushing in to set standards. The real dimension of the problem
9
The states are unprepared to respond to a ‘‘cyber-storms’’ and that ‘‘a massive cyber disruption could have a cascading, long-term impact without adequate co-ordination between governments and governments and the private sector.’’ Booz Allen Hamilton, recommended to ‘‘establish a single voice for cyber-security within government’’ concluding that the ‘‘unique nature of cyber-security requires a new leadership paradigm.’’ Corner stone of cyberspace security strategy : long-term challenge in cyberspace from intelligence agencies and militaries, criminals, and others. Losing this struggle will wreak serious damage on the economic health and national security The single stable solution can be the public-private partnership A new leadership paradigm
10
The creation and support of Regional Cyber-security Centers for the promotion and implementation of cyber-security standards. Each Center shall be affiliated with a nonprofit institution or organization, or consortium thereof, that applies for and is awarded financial assistance under this section. PURPOSE : to enhance the cyber - security of small and medium sized businesses through: (1)the transfer of cyber-security standards, processes, technology, and techniques to Centers and, through them, to small- and medium-sized companies; (2) the participation of individuals from industry, universities, State governments, other agencies, in cooperative technology transfer activities; (3) efforts to make new cyber-security technology, standards, and processes usable by small- and medium-sized companies; Regional Cyber Security Centers – USA example
11
CYBERSECURITY METRICS RESEARCH - that can assess the economic impact of cyber-security. These metrics should measure risk reduction and the cost of defense SECURITY CONTROLS - to block or mitigate known attacks SOFTWARE SECURITY - a prioritized list of software weaknesses known to lead to exploited and exploitable vulnerabilities SOFTWARE CONFIGURATION SPECIFICATION LANGUAGE - establish standard computer-readable language for government contractors and grantees, and in private sector owned critical infrastructure information systems and networks. STANDARD SOFTWARE CONFIGURATION- security settings for operating system software and software utilities VULNERABILITY SPECIFICATION LANGUAGE for vendors to communicate vulnerability data to software users in real time. NATIONAL COMPLIANCE STANDARDS FOR ALL SOFTWARE - a standard testing and accreditation protocol for software built Recommendation: Measures and auditable cyber-security standards
12
What IIRUC Service/Raiffesien Informatik can do? 1.Partnership 2.Know-how 3.Professional Services 4.Product related Services 5.Operational related Services
13
Shift the Security Perspective
14
Security zone Authentification Redundante Infrastructure Intrusion detection Fireproofing Waterproofing Overload protection Access control Video control … Virus protection Firewall Digital certif, Authentification Encription IT-Tools for Checks ... Security management Security policy Risic analyse Security concept Roolbook Quality controlling Audit … Professional Services Product Related Services Operational Related Services Comprehensive Security Physical Security Organi- zational Security IT Security Comprehensive Security
15
Organizational security
16
IT and Business Security
18
Thank you for your attention! SC IIRUC SERVICE SA Thank you for your attention! 7 th “Fabrica de Glucoza” Street Sector 2 020331 Bucharest Romania Tel.: +40-21-232.25.21 Fax: +40-21-232.25.26 Mail: office@iirucservice.rooffice@iirucservice.ro www.iirucservice.ro
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.