Presentation is loading. Please wait.

Presentation is loading. Please wait.

Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T.

Similar presentations


Presentation on theme: "Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T."— Presentation transcript:

1 Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T 2006 April 5, 2006, Riga, Latvia

2 2 Today's Environment  Collaboration Individuals Business Partners Industries Global businesses  Trusted partners

3 3 Today's Environment  Traditional customerbusiness IT support  E-business customer IT solution business  Trusted IT solutions

4 4 Today's Environment  Does IT becomes commodity? Resources on demand  Standardization  Trusted technologies

5 5 Today's Environment  Concerns Breaches of confidentiality Disruption of business operations Theft of intellectual property  “The wonder of the Web is that the customer knows about IT problems the same time you do. There’s no camouflage.” Senior VP of Electronic Brokerage Technology The Computer Crime and Security Survey,CSI/FBI, 2005

6 6 Competitive Advantage  High service level for customers  Complex technology (additional risk)  Public image and branding  Compliance  Business resilience  New Driver - Trust and Differentiation Security as a differentiatorSecurity as a differentiator  Competitiveness for businesses for countries

7 7 Fundamental Principles of Security  Confidentiality Passwords, biometric controls, identity management systems,... Encryption, VPN, SSL, SET...  Integrity Digital signatures, PKI, anti-virus software,...  Availability Backup systems, continuity plans,...

8 8 Regulations  State Secrets Law, 1996  Personal Data Protection Law, 2000  State Information Systems Law, 2002  Electronic Documents Law, 2002  Obligatory technical and organizational requirements for protection of personal data processing systems, Cabinet of Ministers Regulation No.40, January 30, 2001  Common Security Requirements for State Information Systems, Cabinet of Ministers Regulation No.765, October 11, 2005  Regulations on Security Audits of Certification Authorities, Cabinet of Ministers Regulations No.357 and No.358, July 1, 2003  and more...

9 9 Regulations  State Standards LVS ISO/IEC 17799:2005 Information technology – Code of practice for information security management LVS ISO/IEC TR 13335:2003 Information technology - Guidelines for the management of IT Security LVS ISO/IEC 15408:2003 Information technology – Security techniques — Evaluation criteria for IT security LVS ISO/IEC 12207:2002 Information technology – Software life cycle processes and more...  Regulations of the Financial and Capital Market Commission Regulations on the Security of Information Systems of Financial and Capital Market Participants Regulations on Information Encryption and Electronic Signing and more...

10 10 Does a Stronger Lock Help?

11 11 Scope of IT Security  Too often IT security issues are treated in the narrow sense as technologies protecting against viruses, spam, spyware, “bad guys”, etc.  Scope of IT security includes also business continuity planning software development issues personnel security security awareness program and more...

12 12 Scope of IT Security LVS ISO/IEC 17799:2005  Security Policy  Organization of Information security  Asset Management  Human Resource Security  Physical and Environmental Security  Communications and Operations Management  Access control  IS Acquisition, Development, and Maintenance  Information Security Incident Management  Business Continuity Management  Compliance

13 13 IT Security Framework  Use proven values to win competition COBIT to build IT governance ISO/IEC 17799 to manage IT security Access control Asset Management Security policy Organization of Information security Human Resource Security Physical and environmental security Communications and operations management IS Acquisition, Development, and Maintenance Information Security Incident Management Compliance Integrity Confidentiality Availability Business continuity management

14 14 Scope of IT Audit  Assessment of IT support for company’s business objectives IT function compliance with regulatory requirements IT project cost and schedule control IT solution benchmarking to industries’ best practice IT security  Independent audit ISACA Latvia, 60+ members (www.isaca.lv) 48 certified IS auditors (CISA) and certified security managers (CISM)

15 Thank You for Your Attention!   uldis.sukovskis@riti.lv   www.riti.lv


Download ppt "Advantages of IT Security Prof. Uldis Sukovskis, CISA Riga Information Technology Institute Secure information exchange in Electronic media Baltic IT&T."

Similar presentations


Ads by Google