1 / 5

10 Cyber Security Guidelines

10 Cyber Security Guidelines. 5. Cyber d efence. 1. Collaboration model. 2. Situational awareness. 3. C ontinuity of preparedness. 4. Capacities of the police. 6. Enhanced international co-operation. 7. Education and training = knowledge. 8. Legislation.

kempe
Télécharger la présentation

10 Cyber Security Guidelines

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 10 Cyber Security Guidelines 5. Cyber defence 1. Collaboration model 2. Situational awareness 3. Continuity of preparedness 4. Capacities of the police 6. Enhanced international co-operation 7. Education and training= knowledge 8. Legislation 9. Tasks, requirements and service models 10. Monitoring the implementation = stuff that works in Finland

  2. HOW? INFORMATION SECURITY MANAGEMENT CYBER DEFENSE CENTER Public-Private-Partnership

  3. Security Operation Centers PPP Telco SOC ISP SOC Bank SOC Telco SOC ISP SOC Bank SOC Telco SOC ISP SOC Bank SOC Government Critical Infrastructure and Industry Situational Awareness Ministry Ministry Ministry <S Energy Awareness Campaigns Early Warning <S Health Reporting & Stats Incident Management Agency Agency <S Logistics Agency Authority Requests Vulnerability Management <S Food Law enforcement Incident Correlation Threat Intelligence <S Other CERT Collaboration A SOC ecosystem with operative capabilities to collaborate, observe attacks and help recovering. Always confidential, voluntary for participants and very cost-effective. Ref. Finnish HAVARO. https://www.viestintavirasto.fi/en/aboutthesector/reviewsandarticles/informationsecurity.html

  4. PPP Critical infrastructure and information processes Data Privacy Asset Mapping and Classification Risk Management Business Continuity INFORMATION SECURITY MANAGEMENT Compliance Management Security Awareness Business-driven Security & Privacy An Information Security Management System co-operative practice that is supported by a national body. Ref. Finnish HUOVI http://www.varmuudenvuoksi.fi/vuosikertomus-2013/huovi-portaali NIXU CONFIDENTIAL

  5. One-stop shop for high-end cyber security consulting Solutions for Industrial Internet Solutions for Digital Business Solutions for Corporate and IT Security Risk management Situational awareness Vulnerability management Compliance management Information security management Incident response & forensics Identity management Access management Application security Secure software lifecycle Secure development Infrastructure security Delivery models: Advisory assignment – Implementation project – Assessment – Continuous Service NIXU CONFIDENTIAL

More Related