WTS and PCI Nelson Lah Chief Technology Officer Workplace Technology Services May 27, 2009.

Slides:



Advertisements
Similar presentations
The Lucernex Cloud: A software-as-a-service solution delivered via the Cloud What is the Cloud? Cloud Computing is the future of all software applications,
Advertisements

Identity, Governance and Administration as forefront of IT Security model: European and North American Experience Vladislav Shapiro Director of Identity.
Network Security for the Distributed Enterprise January 2011.
Association Management System Norman Campbell Director, Information Systems.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Documenting the Existing Network - Starting Points IACT 418 IACT 918 Corporate Network Planning.
Around the World, Around the Corner WorldPay for Small Business.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
4/17/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Affiliated Information Security Collaborative An Affiliated Enterprise Approach to Information Security Deans and Vice Presidents Meeting April 17, 2014.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Accounts Payables Invoice Automation for SharePoint.
Raz-Lee Security iSecurity for iSeries. 2 Facts about Raz-Lee  Internationally renowned iSeries solutions provider  Founded in 1983  100% focused on.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
PCI DSS Managed Service Solution October 18, 2011.
Directorate of e-Government1 e- Government Strategy for Kenya. By Peter Gakunu, Cabinet Office 23 rd March 2004.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Work Tools of Tomorrow: A Case Study in Innovation Financial Management Institute Jill Kot, Assistant Deputy Minister Workplace Technology Services Ministry.
DEVELOPING SUSTAINABLE ICT INFRASTRUCTURE. Start Feasibility assessment – Understanding our core business In 1998 it was clear that a disproportionate.
New Light ISIS, Management computing in a. ISIS Group ISIS s.a. ISIS Flanders n.v. Formac consult s.a. AMTC.be s.p.r.l employees - Global.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
© Hortonworks Inc Hortonworks Page 1. © Hortonworks Inc Big Data Changes the Game Megabytes Gigabytes Terabytes Petabytes Purchase detail.
QuickBooks, hosted by Reckon Online Catie Cotcher.
SUNY FARMINGDALE Computer Programming & Information Systems BCS451 – Cloud Computing Prof. Tolga Tohumcu.
T r a n s p a r e n t f a s t r e l i a b l e
Blancco – Data Erasure Management
Atkins New PSR Reporting Solution Using Actuate e.Spreadsheet October 2007.
UnitedLayer Managed Private Cloud Saad Saleem Director of Customer Engineering.
A Document Management Solution Joe Axne IT-GURU LLC
Mark Estberg, John Howie Senior Directors Microsoft Corporation SESSION CODE: SIA317.
Identity Solution in Baltic Theory and Practice Viktors Kozlovs Infrastructure Consultant Microsoft Latvia.
CUONG NGUYEN PRIYA PAKHANAVAR RUSSELL ROBINSON RPC Hotels.
PAYMENT CARD INDUSTRY REMEDIATION PROJECT Cheryl Wenezenki-Yolland, PCI Project Owner Nicholas Krischanowsky, PCI Project Director Public Sector Payment.
IBM Mobile Security solutions 1IBM and Business Partner Sellers Only Enterprise Applications and Cloud Services Identity, Fraud, and Data Protection Device.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
_name Kronos Confidential Kronos webTA Federal Time and Attendance System Sample Screens Shots “We specialize in delivering a flexible, integrated,
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
BUSINESS USER MONITORING OBSERVEIT 5.8. Firewall IDS IAM SIEM Business Users IT Users USERS ARE GATEWAYS OF RISK Contractors Systems AppsData.
Module 3: Planning Administrative Access. Overview Determining the Appropriate Administrative Model Designing Administrative Group Strategies Planning.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Clear objectives. clear solutions. Workplace Innovation SOAR Annual Conference Run Straight Consulting Ltd. 350 Bay Street, Suite 1201 Toronto, ON M5H.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
VeriShield Protect Revolutionary technology that simplifies PCI DSS compliance with no system upgrades Now available on V x Solutions!
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
2006 Infrastructure Projects Four Themes: Storage – room to grow Security – reacting to threats Virtual Systems – increased efficiency Service Management.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Public Sector Payment Card Industry (PCI) - Working Forum Nicholas Krischanowsky BC Provincial Treasury LDB Training Centre, Burnaby, BC, May 27, 2009.
Mark Gilbert Microsoft Corporation Services Taxonomy Building Block Services Attached Services Finished Services.
MANAGED LAN SERVICES How will you benefit? Managed LAN service  Full LAN service (hardware, operation, other services)  Per-port pricing  International.
The Claromentis Digital Workplace An Introduction
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Accounting Guru Cloud ERP (Enterprise Resource Planning) ERP Software https:
The Cloud & Your Business Thursday 21 st April 2016 Business in Oxford.
Basharat Institute of Higher Education
Reliable IT Annual Maintenance Contract In Dubai Dial:
Data Center Colocation Services.
Contact Center Security Strategies
Data Center Colocation Services.
A 5-minute overview of ADAudit Plus
Computer Services Business challenge
Financial Markets Business challenge
In the attack index…what number is your Company?
UDTSecure TM.
Presentation transcript:

WTS and PCI Nelson Lah Chief Technology Officer Workplace Technology Services May 27, 2009

WTS - Who We Are and What We Do PCI Initiative for Government – Our Role What We’re Doing Where We’re Going

Workplace Technology Services (WTS) Provides… Shared Services Technology Infrastructure for all 19 Ministries and 168 Broader Public Sector Organizations Technology Infrastructure includes: Computer Workstations Computer Servers Government Network Shared, Government-Wide Applications such as Payroll Enterprise Online Products and Services Who We Are

Every Day, WTS Provides: Services to 4,000 locations, 50,000 customers and 600,000 students 37,000 workstations, 6,700 BlackBerry devices 40,000 accounts, 6 million messages/month (and growing) 50,000 telephone connections 1,600 computer servers, storing 15 terabytes of 31,000 paycheques processed every two weeks FACTS: * $1,000 Vote * ~ 500 full time employees * Mixed-sourcing model * $250M in annual recoveries What We Do

As the IT infrastructure provider for government, we need to ensure support for compliance with new standards Working to enhance existing network in light of new standard Current focus is a core government solution Initial offering of PCI security monitoring with Liquor Distribution Branch Initial offering of security monitoring BC Express Pay and Royal BC Museum The PCI Initiative for Government – Our Role

Infrastructure Remediation Vulnerability Management Security Monitoring Still in early stages of development Developing expertise and capacity to ensure success Ongoing work falls into 3 categories What We’re Doing

Focused on network segmentation of payment applications and Point of Sale (POS) devices Benefits: Reduces size and complexity of annual PCI audit Provides additional security from internal attacks on the payment stream What We’re Doing Infrastructure Remediation Vulnerability Management Security Monitoring

Focused on recording changes within electronic payment infrastructure Automated record keeping allows enhanced reporting Information feeds into Security Monitoring What We’re Doing Infrastructure Remediation Vulnerability Management Security Monitoring

Focused on: monitoring changes and activity within the electronic payment infrastructure reporting anomalies Acquired one of the leading Security Information and Event Management (SIEM) applications What We’re Doing Infrastructure Remediation Vulnerability Management Security Monitoring

Where We’re Going Plan to develop as a shared service offering and very dependent on funding New PCI standard requires that everything be in place and audited by October 2010 Beyond PCI, will consider use of application for Enterprise security Compliance automation Log Management Configuration auditing and provisioning

11 Thank You Nelson Lah Chief Technology Officer Workplace Technology Services Shirley Mitrou A/Executive Director, Client Services Integrated Service Solutions