50 likes | 62 Views
10 Cyber Security Guidelines. 5. Cyber d efence. 1. Collaboration model. 2. Situational awareness. 3. C ontinuity of preparedness. 4. Capacities of the police. 6. Enhanced international co-operation. 7. Education and training = knowledge. 8. Legislation.
E N D
10 Cyber Security Guidelines 5. Cyber defence 1. Collaboration model 2. Situational awareness 3. Continuity of preparedness 4. Capacities of the police 6. Enhanced international co-operation 7. Education and training= knowledge 8. Legislation 9. Tasks, requirements and service models 10. Monitoring the implementation = stuff that works in Finland
HOW? INFORMATION SECURITY MANAGEMENT CYBER DEFENSE CENTER Public-Private-Partnership
Security Operation Centers PPP Telco SOC ISP SOC Bank SOC Telco SOC ISP SOC Bank SOC Telco SOC ISP SOC Bank SOC Government Critical Infrastructure and Industry Situational Awareness Ministry Ministry Ministry <S Energy Awareness Campaigns Early Warning <S Health Reporting & Stats Incident Management Agency Agency <S Logistics Agency Authority Requests Vulnerability Management <S Food Law enforcement Incident Correlation Threat Intelligence <S Other CERT Collaboration A SOC ecosystem with operative capabilities to collaborate, observe attacks and help recovering. Always confidential, voluntary for participants and very cost-effective. Ref. Finnish HAVARO. https://www.viestintavirasto.fi/en/aboutthesector/reviewsandarticles/informationsecurity.html
PPP Critical infrastructure and information processes Data Privacy Asset Mapping and Classification Risk Management Business Continuity INFORMATION SECURITY MANAGEMENT Compliance Management Security Awareness Business-driven Security & Privacy An Information Security Management System co-operative practice that is supported by a national body. Ref. Finnish HUOVI http://www.varmuudenvuoksi.fi/vuosikertomus-2013/huovi-portaali NIXU CONFIDENTIAL
One-stop shop for high-end cyber security consulting Solutions for Industrial Internet Solutions for Digital Business Solutions for Corporate and IT Security Risk management Situational awareness Vulnerability management Compliance management Information security management Incident response & forensics Identity management Access management Application security Secure software lifecycle Secure development Infrastructure security Delivery models: Advisory assignment – Implementation project – Assessment – Continuous Service NIXU CONFIDENTIAL