Download presentation
Presentation is loading. Please wait.
Published byBennett Ramsey Modified over 9 years ago
1
FISHA proof-of-concept vs. NISHA pilot Katarzyna Gorzelak CERT Polska
2
FISHA outcome Prototype of the system (in virtual environment) Portals Basic nodes and super nodes Concept of principles for functioning the network: Membership Operating Managing Financing Disseminating information
3
NISHA action plan Software development Network operation Policy frames Dissemination
4
Software development Review and rebuilding of the FISHA framework Change in architecture: FISHA: P2P network, webservices NISHA: CouchDB – a document-oriented database, perfectly fits in NISHA model of information Development of full functionality Improve user-friendliness Set the nodes in 4 member states in real environment, geographically spread Testing, bug fixing and support NISHA-in-the-box A set of clear instructions to install and adapt the NISHA portal for security teams across Europe who want to join the network
5
Network operation Operating the network in four member states (geographically spread) Feeding the network with content Gathering the feedback from partners
6
Policy Legal and organizational model Sustainable principles of membership, management and operation of the network. Terms of reference Steering committee Licensing of the content Financial model Proposing possible financial models that can sustain the network.
7
Dissemination Looking for partners: producers and brokers of information Locally: media, internet portals, companies Internationally: CERTs, security entities, companies How? International workshops Local workshops to involve local information brokers Using existing local contacts Promotion of the project
8
Where are we now? Rebuilding of the network Setting nodes spread geographically Testing, bug fixing Feeding the network with content Creating policy 8 Reaching information brokers locally
9
NISHA outcome successful pilot implementation of the system, with technical maintenance and resources ensured, operating in accordance with organizational principles established providing tailored security information to target groups
10
THANK YOU
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.