SlideShare una empresa de Scribd logo
1 de 6
Descargar para leer sin conexión
Shared Services Canada
Cyber and IT Security Framework
Presentation to the Information Technology Infrastructure
Roundtable
October 7, 2014
Benoît Long, Senior Assistant Deputy Minister, Transformation,
Service Strategy and Design, and Chair of the Architecture
Framework Advisory Committee
2
• Integrated IT security
risk management
• Security through end-
to-end design
• Enhanced information
and system
protection
• Real-time detection of
security incidents
• Swift incident
response and
recovery
Current State End State Benefits
• One enterprise perimeter/border
defence services
• One enterprise standard secure
remote access solution
• One enterprise secret network to
enable collaboration
• Approximately 20,000 users
• Standardized enterprise SOC
with alternate site
• Coordinated proactive rapid
response and recovery
Cyber and IT Security:
Current-state and End-state Targets
• One enterprise device security
solution with data loss prevention
• 27 perimeter/border defence
services
• 22 different security remote access
solutions
• 32 isolated department-specific
secret networks
• 10,000 users
• Various maturity level Security
Operations Centres (SOC), some
with rudimentary services
• Reactive, slow and siloed response
to cyber threats
• 42-department device security
implementation with partial data
loss prevention services
• Enterprise robust IT security risk
management
• IT security integrated into the
design
• 42 department-specific IT security
risk-management approaches
• IT security as an “add-on”
CYBERSECURITYITSECURITYGCSECRET
IT
3
Cyber and IT Security Framework
INFRASTRUCTURE
& DATA
• Aligned to Canada’s Cyber
Security Strategy (CCSS)
• Security and privacy built in as
part of end-to-end service
design
• Partnership with Treasury
Board Secretariat,
Communications Security
Establishment Canada and
Public Safety
Shared Services Canada is mandated to
protect the infrastructure and associated data-
in-transit, storage, and use.
OPERATE EVOLVE TRANSFORM
Cyber and IT Security Functions
4
PREVENTION
• Trusted infrastructure
products and services
through supply chain
integrity
• Cyber and IT security
(including privacy)
policies and standards
• Security awareness and
training
• Infrastructure protection
services
• Data protection services
• Identity, Credentials and
Access Management
services
• Secret infrastructure
services
• Business continuity and
emergency management
DETECTION
• Coordination of GC-
wide monitoring,
detection, identification,
prioritization and
reporting of IT security
incidents
• Automated, real-time
threat monitoring,
security information and
event management and
analysis
• Log analysis and
investigations
• Security and privacy
assessment
• Vulnerability
assessments
RESPONSE
• GC-wide coordination
and remediation of IT
security incidents
• Threat assessment and
situational reporting
• Coordination and
distribution of GC
product alerts, warnings
and advisories
• Forensics
• Software integrity
through security
configuration or
replacement
• Infrastructure integrity
through configuration or
replacement
RECOVERY
• Highly specialized IT
security incident
recovery services
• Mitigation advice and
guidance
• Vulnerability
remediation
• Post-incident analysis
SECURITY MANAGEMENT
Governance Innovation Engagement Risk Management
PREVENTION DETECTION RESPONSE RECOVERY
5
Security Principles
 Trusted equipment and services through supply chain integrity
 Security and privacy by design to ensure that all aspects of security are
addressed as part of design, balancing service, security and savings
 Gradual enhancement from a network-based security model to include
application and data-centric security – apply security controls as close to the
data as practical
 Privileged access to data will be maintained and multi-tenancy will be built into
systems where sensitive data owned by one partner cannot be seen by
another partner or by unauthorized individuals.
 Security breaches in one part of the infrastructure are quickly detected and
contained without spreading to other parts of the infrastructure.
 Maintain and improve the security posture as part of moving to enterprise
services (i.e. don’t reduce security).
6
 Elaborate and define the functions as part of Shared Services Canada’s
enterprise services.
 Develop a multi-year roadmap toward the implementation of the enterprise
services.
 Develop associated organizational roles and responsibilities and a costing
framework.
Next Steps

Más contenido relacionado

La actualidad más candente

The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsDan Michaluk
 
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FONandita Nityanandam
 
NAC - A Solution for Disappearing Perimeter
NAC - A Solution for Disappearing Perimeter NAC - A Solution for Disappearing Perimeter
NAC - A Solution for Disappearing Perimeter RiskNaut
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Securitymanoharparakh
 
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...crmcg2007
 
Payment Card Industry Security Standards
Payment Card Industry Security StandardsPayment Card Industry Security Standards
Payment Card Industry Security StandardsAshintha Rukmal
 
Distributed Ledger PKI Risk Management Framework, Rob Campbell
Distributed Ledger PKI Risk Management Framework, Rob CampbellDistributed Ledger PKI Risk Management Framework, Rob Campbell
Distributed Ledger PKI Risk Management Framework, Rob CampbellNapier University
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...mfrancis
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013John Secondari
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionJim Gilsinn
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedTempered
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesIvanti
 
IT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerIT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerHernan Huwyler, MBA CPA
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell securityRonny Stavem
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsJim Gilsinn
 
You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentResilient Systems
 

La actualidad más candente (19)

The privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analyticsThe privacy and security implications of AI, big data and predictive analytics
The privacy and security implications of AI, big data and predictive analytics
 
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
3 Reasons Why Manufacturing Companies are Moving to Dynamics 365FO
 
Building Cybersecurity into a Greenfield ICS Project
Building Cybersecurity into a Greenfield ICS ProjectBuilding Cybersecurity into a Greenfield ICS Project
Building Cybersecurity into a Greenfield ICS Project
 
NAC - A Solution for Disappearing Perimeter
NAC - A Solution for Disappearing Perimeter NAC - A Solution for Disappearing Perimeter
NAC - A Solution for Disappearing Perimeter
 
Advanced Data Center Security
Advanced Data Center SecurityAdvanced Data Center Security
Advanced Data Center Security
 
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
Protecting Critical Infrastructure in the Design-Build Framework...A Focus on...
 
Payment Card Industry Security Standards
Payment Card Industry Security StandardsPayment Card Industry Security Standards
Payment Card Industry Security Standards
 
Distributed Ledger PKI Risk Management Framework, Rob Campbell
Distributed Ledger PKI Risk Management Framework, Rob CampbellDistributed Ledger PKI Risk Management Framework, Rob Campbell
Distributed Ledger PKI Risk Management Framework, Rob Campbell
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013Farfield systems caoabilities feb 2013
Farfield systems caoabilities feb 2013
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hacked
 
The Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center LicensesThe Biggest Mistake you can make with your Data Center Licenses
The Biggest Mistake you can make with your Data Center Licenses
 
IT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan HuwylerIT Governance Roles and Data Governance - Hernan Huwyler
IT Governance Roles and Data Governance - Hernan Huwyler
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
Sweden dell security
Sweden dell securitySweden dell security
Sweden dell security
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
You've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The IncidentYou've Been Breached: How To Mitigate The Incident
You've Been Breached: How To Mitigate The Incident
 

Destacado

Security and Compliance in Regulated Industries
Security and Compliance in Regulated IndustriesSecurity and Compliance in Regulated Industries
Security and Compliance in Regulated IndustriesDreamforce
 
Deloitte Federal Technology Case Competition - Team PKS
Deloitte Federal Technology Case Competition - Team PKSDeloitte Federal Technology Case Competition - Team PKS
Deloitte Federal Technology Case Competition - Team PKSJohn Matthews
 
Deloitte_S4 HANA Finace for Retailers
Deloitte_S4 HANA Finace for RetailersDeloitte_S4 HANA Finace for Retailers
Deloitte_S4 HANA Finace for RetailersArjun Krishnamurthy
 
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...KBIZEAU
 
Accelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise ApplicationsAccelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise ApplicationsSplunk
 
MDM106 - MDM106_Leading_with_Data___Governance_for_One_Finance
MDM106 - MDM106_Leading_with_Data___Governance_for_One_FinanceMDM106 - MDM106_Leading_with_Data___Governance_for_One_Finance
MDM106 - MDM106_Leading_with_Data___Governance_for_One_FinanceAlistair Wallace
 
Shared Services Canada - Transformation Initiatives
Shared Services Canada - Transformation InitiativesShared Services Canada - Transformation Initiatives
Shared Services Canada - Transformation InitiativesKBIZEAU
 
Government digital transformation
Government digital transformationGovernment digital transformation
Government digital transformationDeloitte UK
 
Digital Government Transformation: The journey to government’s digital future
Digital Government Transformation: The journey to government’s digital futureDigital Government Transformation: The journey to government’s digital future
Digital Government Transformation: The journey to government’s digital futureDeloitte United States
 
PowerPoint Hacks for Rookies: 4 Must Consider Aspects
PowerPoint Hacks for Rookies: 4 Must Consider AspectsPowerPoint Hacks for Rookies: 4 Must Consider Aspects
PowerPoint Hacks for Rookies: 4 Must Consider Aspects24Slides
 

Destacado (12)

Robert David CV
Robert David CVRobert David CV
Robert David CV
 
Carrera germán
Carrera germánCarrera germán
Carrera germán
 
Security and Compliance in Regulated Industries
Security and Compliance in Regulated IndustriesSecurity and Compliance in Regulated Industries
Security and Compliance in Regulated Industries
 
Deloitte Federal Technology Case Competition - Team PKS
Deloitte Federal Technology Case Competition - Team PKSDeloitte Federal Technology Case Competition - Team PKS
Deloitte Federal Technology Case Competition - Team PKS
 
Deloitte_S4 HANA Finace for Retailers
Deloitte_S4 HANA Finace for RetailersDeloitte_S4 HANA Finace for Retailers
Deloitte_S4 HANA Finace for Retailers
 
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
 
Accelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise ApplicationsAccelerating SDLC for Large Public Sector Enterprise Applications
Accelerating SDLC for Large Public Sector Enterprise Applications
 
MDM106 - MDM106_Leading_with_Data___Governance_for_One_Finance
MDM106 - MDM106_Leading_with_Data___Governance_for_One_FinanceMDM106 - MDM106_Leading_with_Data___Governance_for_One_Finance
MDM106 - MDM106_Leading_with_Data___Governance_for_One_Finance
 
Shared Services Canada - Transformation Initiatives
Shared Services Canada - Transformation InitiativesShared Services Canada - Transformation Initiatives
Shared Services Canada - Transformation Initiatives
 
Government digital transformation
Government digital transformationGovernment digital transformation
Government digital transformation
 
Digital Government Transformation: The journey to government’s digital future
Digital Government Transformation: The journey to government’s digital futureDigital Government Transformation: The journey to government’s digital future
Digital Government Transformation: The journey to government’s digital future
 
PowerPoint Hacks for Rookies: 4 Must Consider Aspects
PowerPoint Hacks for Rookies: 4 Must Consider AspectsPowerPoint Hacks for Rookies: 4 Must Consider Aspects
PowerPoint Hacks for Rookies: 4 Must Consider Aspects
 

Similar a Itir oct0714-network security-en

Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesMuhammad Mudassar
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Schneider Electric
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkMarcoAfzali
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessInfopulse
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security ServicesePlus
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2KBIZEAU
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowPrecisely
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessJoAnna Cheshire
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...North Texas Chapter of the ISSA
 
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and HealthcareTina Dominguez
 
Shield Your Data: Master Cyber Security Essentials
Shield Your Data: Master Cyber Security EssentialsShield Your Data: Master Cyber Security Essentials
Shield Your Data: Master Cyber Security EssentialsFutureSkills Prime
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information SecurityAhmed Sayed-
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxTheWalkerGroup1
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcingNicholas Davis
 
IT Security Services
IT Security ServicesIT Security Services
IT Security ServicesLalit Singh
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools SolarWinds
 

Similar a Itir oct0714-network security-en (20)

Ooredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20ServicesOoredoo%20Security%20Managed%20Services
Ooredoo%20Security%20Managed%20Services
 
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
Advanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your BusinessAdvanced IT and Cyber Security for Your Business
Advanced IT and Cyber Security for Your Business
 
ePlus Managed Security Services
ePlus Managed Security ServicesePlus Managed Security Services
ePlus Managed Security Services
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Effective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to KnowEffective Security Monitoring for IBM i: What You Need to Know
Effective Security Monitoring for IBM i: What You Need to Know
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
 
UDT - Government and Healthcare
UDT - Government and HealthcareUDT - Government and Healthcare
UDT - Government and Healthcare
 
Shield Your Data: Master Cyber Security Essentials
Shield Your Data: Master Cyber Security EssentialsShield Your Data: Master Cyber Security Essentials
Shield Your Data: Master Cyber Security Essentials
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Starting your Career in Information Security
Starting your Career in Information SecurityStarting your Career in Information Security
Starting your Career in Information Security
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
The Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docxThe Crucial Role of IT Network Support Services.docx
The Crucial Role of IT Network Support Services.docx
 
Network security, change control, outsourcing
Network security, change control, outsourcingNetwork security, change control, outsourcing
Network security, change control, outsourcing
 
IT Security Services
IT Security ServicesIT Security Services
IT Security Services
 
Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools Government Webinar: Improving Security Compliance with IT Monitoring Tools
Government Webinar: Improving Security Compliance with IT Monitoring Tools
 
It security cognic_systems
It security cognic_systemsIt security cognic_systems
It security cognic_systems
 

Más de KBIZEAU

Review of the Collaborative Procurement Process
Review of the Collaborative Procurement ProcessReview of the Collaborative Procurement Process
Review of the Collaborative Procurement ProcessKBIZEAU
 
Delivering Public Sector Innovation
Delivering Public Sector InnovationDelivering Public Sector Innovation
Delivering Public Sector InnovationKBIZEAU
 
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...KBIZEAU
 
Government of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning PresetationGovernment of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning PresetationKBIZEAU
 
Hill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanadaHill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanadaKBIZEAU
 
Itir oct0714-afac report-en
Itir oct0714-afac report-enItir oct0714-afac report-en
Itir oct0714-afac report-enKBIZEAU
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-enKBIZEAU
 
Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014KBIZEAU
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-enKBIZEAU
 
2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canadaKBIZEAU
 
Ssc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business planSsc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business planKBIZEAU
 
2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-enKBIZEAU
 
2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-enKBIZEAU
 
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...KBIZEAU
 
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_ConsolidatedNetwork Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_ConsolidatedKBIZEAU
 
Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015KBIZEAU
 
Pablo sobrino smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino   smart-dps presentation to itac - march 4-2014 - englishPablo sobrino   smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino smart-dps presentation to itac - march 4-2014 - englishKBIZEAU
 
SSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance ObjectivesSSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance ObjectivesKBIZEAU
 
Workplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeWorkplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeKBIZEAU
 
Future Role of the CIO
Future Role of the CIO Future Role of the CIO
Future Role of the CIO KBIZEAU
 

Más de KBIZEAU (20)

Review of the Collaborative Procurement Process
Review of the Collaborative Procurement ProcessReview of the Collaborative Procurement Process
Review of the Collaborative Procurement Process
 
Delivering Public Sector Innovation
Delivering Public Sector InnovationDelivering Public Sector Innovation
Delivering Public Sector Innovation
 
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
 
Government of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning PresetationGovernment of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning Presetation
 
Hill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanadaHill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanada
 
Itir oct0714-afac report-en
Itir oct0714-afac report-enItir oct0714-afac report-en
Itir oct0714-afac report-en
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-en
 
Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-en
 
2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada
 
Ssc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business planSsc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business plan
 
2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en
 
2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en
 
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
 
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_ConsolidatedNetwork Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
 
Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015
 
Pablo sobrino smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino   smart-dps presentation to itac - march 4-2014 - englishPablo sobrino   smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino smart-dps presentation to itac - march 4-2014 - english
 
SSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance ObjectivesSSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance Objectives
 
Workplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeWorkplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) Initiative
 
Future Role of the CIO
Future Role of the CIO Future Role of the CIO
Future Role of the CIO
 

Último

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Último (20)

08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Itir oct0714-network security-en

  • 1. Shared Services Canada Cyber and IT Security Framework Presentation to the Information Technology Infrastructure Roundtable October 7, 2014 Benoît Long, Senior Assistant Deputy Minister, Transformation, Service Strategy and Design, and Chair of the Architecture Framework Advisory Committee
  • 2. 2 • Integrated IT security risk management • Security through end- to-end design • Enhanced information and system protection • Real-time detection of security incidents • Swift incident response and recovery Current State End State Benefits • One enterprise perimeter/border defence services • One enterprise standard secure remote access solution • One enterprise secret network to enable collaboration • Approximately 20,000 users • Standardized enterprise SOC with alternate site • Coordinated proactive rapid response and recovery Cyber and IT Security: Current-state and End-state Targets • One enterprise device security solution with data loss prevention • 27 perimeter/border defence services • 22 different security remote access solutions • 32 isolated department-specific secret networks • 10,000 users • Various maturity level Security Operations Centres (SOC), some with rudimentary services • Reactive, slow and siloed response to cyber threats • 42-department device security implementation with partial data loss prevention services • Enterprise robust IT security risk management • IT security integrated into the design • 42 department-specific IT security risk-management approaches • IT security as an “add-on” CYBERSECURITYITSECURITYGCSECRET IT
  • 3. 3 Cyber and IT Security Framework INFRASTRUCTURE & DATA • Aligned to Canada’s Cyber Security Strategy (CCSS) • Security and privacy built in as part of end-to-end service design • Partnership with Treasury Board Secretariat, Communications Security Establishment Canada and Public Safety Shared Services Canada is mandated to protect the infrastructure and associated data- in-transit, storage, and use. OPERATE EVOLVE TRANSFORM
  • 4. Cyber and IT Security Functions 4 PREVENTION • Trusted infrastructure products and services through supply chain integrity • Cyber and IT security (including privacy) policies and standards • Security awareness and training • Infrastructure protection services • Data protection services • Identity, Credentials and Access Management services • Secret infrastructure services • Business continuity and emergency management DETECTION • Coordination of GC- wide monitoring, detection, identification, prioritization and reporting of IT security incidents • Automated, real-time threat monitoring, security information and event management and analysis • Log analysis and investigations • Security and privacy assessment • Vulnerability assessments RESPONSE • GC-wide coordination and remediation of IT security incidents • Threat assessment and situational reporting • Coordination and distribution of GC product alerts, warnings and advisories • Forensics • Software integrity through security configuration or replacement • Infrastructure integrity through configuration or replacement RECOVERY • Highly specialized IT security incident recovery services • Mitigation advice and guidance • Vulnerability remediation • Post-incident analysis SECURITY MANAGEMENT Governance Innovation Engagement Risk Management PREVENTION DETECTION RESPONSE RECOVERY
  • 5. 5 Security Principles  Trusted equipment and services through supply chain integrity  Security and privacy by design to ensure that all aspects of security are addressed as part of design, balancing service, security and savings  Gradual enhancement from a network-based security model to include application and data-centric security – apply security controls as close to the data as practical  Privileged access to data will be maintained and multi-tenancy will be built into systems where sensitive data owned by one partner cannot be seen by another partner or by unauthorized individuals.  Security breaches in one part of the infrastructure are quickly detected and contained without spreading to other parts of the infrastructure.  Maintain and improve the security posture as part of moving to enterprise services (i.e. don’t reduce security).
  • 6. 6  Elaborate and define the functions as part of Shared Services Canada’s enterprise services.  Develop a multi-year roadmap toward the implementation of the enterprise services.  Develop associated organizational roles and responsibilities and a costing framework. Next Steps