Lauren MayInformation Security Institute, QUT1 of 18 Towards Protecting Critical Infrastructure Lauren May, Tim Lane The Role of Information Security Management.

Slides:



Advertisements
Similar presentations
ICT Services Suppliers Briefing Thursday, 17 September 2009.
Advertisements

WCDR Thematic Panel Governance: Institutional and Policy Frameworks for Risk Reduction Annotated Outline UNDP – UNV – ProVention Consortium – UN-Habitat.
What are key underlying principles and accepted strategic approaches for addressing monitoring discrimination? Partnership Participation Child rights approach.
Priority Environmental Investment Programme (PEIP) – CARDS Regional Regional Meeting for Senior Officials from SEE and Donors Community 28th November 2008.
What does program impact mean to you? Wed like to know… Please write your ideas on a post-it note.
January 2009 Equality of Opportunity Elaine Clinton HMI.
Information and Communication Technologies (ICT) in the Seventh Framework Programme Large-scale integrating projects (IPs)
REEP A Process Model for Developing and Implementing Collectively owned enterprises in rural areas (AgriSETA Workshop: Premier Hotel O.R. Tambo) 21 September.
NORTHERN TERRITORY TREASURY Performance Development Framework (PDF) Review 2003 Original Treasury PDF Implemented 2009 November reviewed.
Second Cycle of Quality Assurance: 2012−2017 Private Providers QA Forum Wits School of Education Dr Mark Hay Executive Director: Quality Assurance 1 September.
Training Institute of Public Administration Tirana, ALBANIA
Promoting CSR in Albania Global Compact and Corporate Social Responsibility Project October 19, 2012 United Nations Development Programme.
E-Government Policies, Strategies and Implementation Jamal Shahin Institute for European Studies, Vrije Universiteit Brussel 15:00 – 15:20, 21 December.
1 Telstra in Confidence Managing Security for our Mobile Technology.
CRICOS Provider No 00025B Strategies for enhancing teaching and learning: Reflections from Australia Merrilyn Goos Director Teaching and Educational Development.
Challenge Questions How good is our strategic leadership?
Measuring the effectiveness of government IT systems Current ANAO initiatives to enhance IT Audit integration and support in delivering Audit outcomes.
Rethinking Business Responsibility In India: a review of Pharmaceutical & Private Healthcare sectors Vikash Batham, CUTS International Developing an Inclusive.
Second Sudan Consortium March 2007 Water Supply and Sanitation Service Delivery and Challenges in Southern Sudan Ministry of Cooperatives and Rural Development.
Information Assurance and Higher Education Clifton Poole National Defense University Carl Landwehr National Science Foundation Tiffany Olson Jones Symantec.
Emergency Management & Homeland Security Interface Samuel Musa National Defense University.
Preparing Scotland’s first Records Management Plan Ava Wieclawska Records Manager.
CULTURERESOURCECENTRE Internationalisation of Sydney Institute cultureresourcecentre.com.au – 14 May 2010 LEADERSHIP FORUM INTERNATIONALISATION OF SYDNEY.
Improving Employee Volunteer Programs A view from both sides Hayley Hext 2006 Research supported by:
Experiences from establishing a national Centre for Information Security in Norway TERENA Networking Conference 2003 Maria Bartnes Dahl &
Northampton – Development Opportunities a framework for enabling positive change.
BC Injury Prevention Strategy Working Paper for Discussion.
Cross Border Animal Health Plan of Action – Kenya and Uganda Four Strategic areas 1. To improve prevention, management and control of cross border animal.
A Security Training Program through Transformational Leadership and Practical Approaches Tanetta N. Isler Federal Information Systems Security Educators’
Critical Role of ICT in Parliament Fulfill legislative, oversight, and representative responsibilities Achieve the goals of transparency, openness, accessibility,
1 UNISDR Secretariat Asia and Pacific IAP meeting 25 March Learning from the HFA progress review.
Conservation Districts in New York Training Module 1.
A College Awareness Month Initiative Sponsored by: Muskegon Opportunity
1 From E-Government to Connected Governance: Harnessing Information & Communication Technologies for Knowledge Acquisition and Sharing Michael G. Mimicopoulos.
2011 UKPSF 2011 The UK Professional Standards Framework for for teaching and supporting learning in higher education 1.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
New Realities. New Opportunities. Engaging employers on immigrant employment Elizabeth McIsaac, TRIEC Toronto LIPs Labour Market Meeting 14 April 2010.
Assessments. Assessment in the Project Cycle DESIGN IMPLEMENTATION MONITORING EVALUATION ASSESSMENT.
Evaluating Effectiveness To what effect? Joanne Sharpe, Office of Development Effectiveness, AusAID.
Presented by Moses Tenywa Makerere University Integrated Water Resources Management in Eastern Africa: Coping with ‘complex hydrology’
WORLD BANK / WWF ALLIANCE FOR FOREST CONSERVATION AND SUSTAINABLE USE Reporting Progress in Protected Areas - a Tracking Tool Leonardo Lacerda, WWF International.
ANALYTICS IN HIGHER EDUCATION: PROGRESS AND PROMISE July 2012 Susan Grajek, PhD Vice President, EDUCAUSE.
Joseph Richardson Senior Fellow, ICC ICC Survey of CERT Capacity in Africa July 2010.
Nuclear Security Culture William Tobey Workshop on Strengthening the Culture of Nuclear Safety and Security, Sao Paulo, Brazil August 25-26, 2014.
The Impact of Evolving IT Security Concerns On Cornell Information Technology Policy.
EAUC-Scotland Campus Sustainability Programme Campus Sustainability Conference 6 May 2008.
Adult learning: a cornerstone for our future Marijke Dashorst.
Chapter 4 Developing and Sustaining a Knowledge Culture
Technical Session 1: Enhancing Resilience at the Local Level Background document IFRC & ADRRN.
ICG HE Advisers’ Conference. Objectives To identify the skill and knowledge requirements of careers coordinators and other school and college staff to.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Innovation Forum: some conclusions Sarah Porter Head of Innovation, JISC.
Ud Strategic Plan 2009/10 – 2011/12 Presentation to the NCOP:Select Committee on Social Services.
International Security Management Standards. BS ISO/IEC 17799:2005 BS ISO/IEC 27001:2005 First edition – ISO/IEC 17799:2000 Second edition ISO/IEC 17799:2005.
PRESENTATION TO PORTFOLIO COMMITTEE ON WATER AFFAIRS AND FORESTRY Cindy Damons 28 May 2008 The role of municipalities in managing and giving effect to.
Aim To examine what developments are needed in curricula to prepare military officers and defense officials for their roles in dealing with future defense.
Kathy Corbiere Service Delivery and Performance Commission
Rethinking a Responsibility In India: a review of Pharmaceutical & Private Healthcare sectors BUSINESSES’ CONTRIBUTION TOWARDS GROWTH & SUSTAINABLE DEVELOPMENT.
Sudan Assessing Pro-Poor Efforts through the Budget Sudan Consortium March 9, 2006.
Roles and Responsibilities of Community Health Workers (CHW) within the overall DRM system in Pakistan Module 1 Session 1.4 National Disaster Management.
Implementation of Insurance Core Principles and FSAP Evaluations The Portuguese FSAP experience Gabriel Bernardino Instituto de Seguros de Portugal.
Introducing Media Arts. Victorian Curriculum F–10 Released in September 2015 as a central component of the Education State Provides a stable foundation.
BP Centro Introduction and market entry to North-East Europe.
Middle Managers Workshop 2: Measuring Progress. An opportunity for middle managers… Two linked workshops exploring what it means to implement the Act.
Joint Principles for Adaptation (JPAs) By Marlene/Rudolf
Crisis management related research at
Framework & Guidelines on Land Policy in Africa, AU Declaration on Land Issues and Challenges: Philosophy, objectives and trends Presentation by Sue Mbaya.
Introducing Intercultural Capability
UNIVERSITY OF ZULULAND INSTITUTIONAL FORUM PRESENTATION 13 September /24/2019.
Moderator Mohamed M. K. Elhaj
Presentation transcript:

Lauren MayInformation Security Institute, QUT1 of 18 Towards Protecting Critical Infrastructure Lauren May, Tim Lane The Role of Information Security Management in Australian Universities

Lauren MayInformation Security Institute, QUT2 of 18 Outline Goals IS Threats/Issues in the Tertiary Sector The Need for a Systemic Approach The Survey Practitioner’s Management Model The Trial Conclusion

Lauren MayInformation Security Institute, QUT3 of 18 Goal of this research To improve the culture of compliance towards information security in the Australian university sector.

Lauren MayInformation Security Institute, QUT4 of 18 IS Threats in the Tertiary Sector Universities: host a large number of diverse systems IT exploration and research reflect community standards

Lauren MayInformation Security Institute, QUT5 of 18 Issues in Tertiary Environment Challenge of cultures and technologies –academia needs –corporate and business requirements –transient and explorative student base

Lauren MayInformation Security Institute, QUT6 of 18 Balance of requirements –conflicts of priorities –coordinated security approach –acceptance in environment IS Issues in Tertiary Environment

Lauren MayInformation Security Institute, QUT7 of 18 The Need for a Systemic Approach to Managing Security existing approaches - standards –no single point of understanding analysis of factors and issues need systemic approach to ISM which will progress appropriate good practice

Lauren MayInformation Security Institute, QUT8 of 18 The Survey... Participants: all 38 Australian universities – 100% response – current status of ISM ? – key issues surrounding ISM ? – how to improve ISM ?

Lauren MayInformation Security Institute, QUT9 of The Survey – key findings existing approaches awareness, understanding structured coordinated model management support resources

Lauren MayInformation Security Institute, QUT10 of 18 Security Practitioner’s Management Model

Lauren MayInformation Security Institute, QUT11 of 18 Security Practitioner’s Management Model

Lauren MayInformation Security Institute, QUT12 of 18 Security Practitioner’s Management Model

Lauren MayInformation Security Institute, QUT13 of 18 Security Practitioner’s Management Model

Lauren MayInformation Security Institute, QUT14 of 18 Security Practitioner’s Management Model

Lauren MayInformation Security Institute, QUT15 of 18 Security Practitioner’s Management Model

Lauren MayInformation Security Institute, QUT16 of 18 Security Practitioner’s Management Model

Lauren MayInformation Security Institute, QUT17 of 18 In trial at Southern Cross University IS practitioner senior management IT staff non-IT staff (end users)

Lauren MayInformation Security Institute, QUT18 of 18 Conclusion IS - an important role in universities comprehensive survey supports concepts model focuses on how to transparently progress security knowledge to implementation in trial at Southern Cross University future research – benchmarking, measurement