Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies.

Slides:



Advertisements
Similar presentations
NeDAP eSecurity Action Line SOIS meeting , Riga Jaak Tepandi, Estonia.
Advertisements

A strategy for a Secure Information Society –
Presentation to WTO/CTD Seminar on e-commerce Richard Bourassa Director, International Policy Director, International Policy Electronic Commerce Branch.
Steps towards E-Government in Syria
New EU Forest Strategy and Update on Forest Information and Monitoring
Digital Agenda Unleashing the Potential of Cloud Computing in Europe Ken Ducatel Head of Unit Software and Services, Cloud European Commission (Directorate.
Electronic commerce EDI (8 decade) – base of EC – “Netscape” – propose SSL (Secure Sockets Layer) 1995 – “Amazon.com” “eBay.com” 1998 – DSL (Digital.
Digital Identity Group May GIXEL  GIXEL is the professional association of electronic component and system industries in France. It brings together.
CEN WS/BII2 1 Spreading interoperability in eProcurement processes across Europe Open Seminar Brussels December 6, 2012.
ENISA Cyber Security Strategies Workshop November 27, 2014 Brussels
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
The Geopolitics of Personal Data and the Governance of Privacy Colin J. Bennett Department of Political Science University of Victoria BC, Canada
Cybersecurity Issues Impacting Public Sector Financial Management OASIS e-Gov Washington Workshop, April John Sabo Director Global Government Relations.
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
Information security An introduction to Technology and law with focus on e-signature, encryption and third party service Yue Liu Feb.2008.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
NIS Directive and NIS Platform
European Union Agency for Network and Information Security Follow ENISA: ENISA and standards Sławomir Górniak European Union Agency.
Standards for Shared ICT Jeju, 13 – 16 May 2013 Gale Lightfoot Senior Staff Program Manager, Office of the CTO, SPB Cisco ATIS Cybersecurity Standards.
Asia Pacific Economic Cooperation Workshop on Meteorological and Hydrologic Cooperation Within APEC January 12, 2001 Albuquerque, NM.
IT Security Policy in Japan 23 September 2002 Office of IT Security Policy Ministry of Economy, Trade and Industry JAPAN.
Giandonato CAGGIANO ENISA MANAGEMENT BOARD REPRESENTATIVE LEGAL ADVISER ON EUROPEAN AFFAIRS OF THE MINISTRY OF COMMUNICATIONS U. OF ROMA TRE LAW FACULTY.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
1 National Electronic Commerce Strategies The Malaysian Experience Ho Siew Ching Ministry of International Trade and Industry Malaysia Expert Meeting on.
21 st April th CEPIS Spring Council - Prague Presentation Title Here 30pt Arial Data retention Draft statement for CEPIS By CEPIS LSI.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
DOCUMENT #:GSC15-PLEN-53 FOR:Presentation SOURCE:ETSI AGENDA ITEM:PLEN 6.11 CONTACT(S):Emmanuel Darmois, Board Member Marylin Arndt, TC M2M chair Smart.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
World Class Standards CCIF New York - April Grids, Clouds and Service Infrastructures ETSI Strategy & New Initiatives.
State Alliance for e-Health Conference Meeting January 26, 2007.
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
Draft – discussion only Content Standards WG (Documents and Data) Proposed HITSC Workgroup Evolution 1 Architecture, Services & APIs WG Transport and Security.
Overview Privacy Management Reference Model and Methodology (PMRM) John Sabo Co-Chair, PMRM TC.
E-Transformation Turkey Project State Planning Organization March 17, 2005 Interoperability and Metadata Workshop Ankara, Turkey.
Internet Banking Key Issues Internet Banking Working Group May 14, 1998.
JOINING UP GOVERNMENTS EUROPEAN COMMISSION Establishing a European Union Location Framework.
Software Industry Issues Mark Lange Microsoft EMEA March 1, 2005.
DOCUMENT #:GSC15-PLEN-62 FOR:Presentation SOURCE:ISACC AGENDA ITEM:Opening Plenary (6.14) CONTACT(S):Jim MacFie Cloud Computing Jim MacFie Chairman, ISACC.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Future Regional Trends, Regional Direction and Cooperation Global Cybersecurity Agenda Pillars.
New Standardisation Package and State Policy Kvetoslava Steinlová, SOSMT UNECE MARS Bratislava
Introduction to our reality
Jacques Bus Head of Unit, DG INFSO-F5 “Security” European Commission FP7 launch in the New Member States Regional on-line conference 22 January 2007 Objective.
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
International Telecommunication Union ITU-T Cybersecurity Symposium - Florianópolis, Brazil, 4 October 2004 Infrastructure Security: The impact on Telecommunications.
ATIS Identity Management Standards Development DOCUMENT #:GSC13-PLEN-37 FOR:Presentation SOURCE:ATIS AGENDA ITEM:Plenary; IdM and Identification Systems;
EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final} Digital Enlightenment.
Deconstructing the EU NIS Directive: model, architecture, interfaces, expressions Tony Rutkowski, 08.
 ROAD SAFETY: the European Union Policy European Commission, Directorate General for Mobility & Transport «Road Safety.
Information and Network security: Lithuania Tomas Lamanauskas Deputy Director Communications Regulatory Authority (RRT) Republic of Lithuania; ENISA Liaison.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 10 – Information society and media.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
OASIS IDtrust Member Section June Leung Chair, OASIS IDtrust Member Section Steering Committee
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
Trust in Trust Frameworks, the missing link  Abbie Barbir, Ph.D  OASIS Board of Directors,
I&S Meeting 26 September 2011 Draft PIA Tool. © 2011 GS1 Agenda Introduction PIA Requirements Background RFID PIA Tool demonstration Next steps for PIA.
Digital Single Market Valentinas KVIETKUS Baltic Assembly, Ryga
Inter-American Telecommunication Commission
ANSI – ESOs meeting Washington February 2017
Inter-American Telecommunication Commission
A policy framework for an open and trusted Internet
Higher Education’s Role in the Identity Ecosystem
E-Commerce for Developing Countries (EC-DC)
Sameer Sharma, ITU 7 August, 2018 Dhaka, Bangladesh.
Cybersecurity Issues Impacting Public Sector Financial Management OASIS e-Gov Washington Workshop, April John Sabo Director.
National Strategy for Trusted Identities in Cyberspace
Presentation transcript:

Cloud Computing, Policy Management and Standardization Europe Identity Conference 2011 John Sabo, Director Global Government Relations, CA Technologies Chair, OASIS IDtrust Member Section Steering Committee when title IS NOT a question there is NO ‘WE CAN’ in the box

Cloud, Cloud Infrastructures, and the Expanding Reliance on Standardization  Cloud Computing and Cloud-based infrastructures − e-identity systems − Smart Grid systems − electronic health systems − government services  Cybersecurity risk management  Data protection, privacy and related data retention and law enforcement issues  International laws, regulations, and policies

U.S. National Strategy for Trusted Identities in Cyberspace (NSTIC)  public and private sector collaboration to raise the level of trust associated with the identities of individuals, organizations, networks, services, and devices involved in online transactions  an identity ecosystem that will:  enhance privacy and support of civil liberties  be secure and resilient and part of layered security  ensure policy and technology interoperability among identity solutions  be built from identity solutions that are cost-effective and easy to use

NSTIC Policy and Technical Interoperability — Technical interoperability (including semantic interoperability) refers to the ability for different technologies to communicate and exchange data based upon well-defined and testable interface standards — Policy- level interoperability is the ability for organizations to adopt common business policies and processes (e g, liability, identity proofing, and vetting) related to the transmission, receipt, and acceptance of data between systems — The use of open and collaboratively developed security standards and the presence of auditable security processes are critical to an identity solution’s trustworthiness

International Policy-Standards Convergence — Evaluation report on the Data Retention Directive (Directive 2006/24/EC) from the European Commission to the Council and the European Parliament - April 18, 2011 — ARTICLE 29 DATA PROTECTION WORKING PARTY, 00062/10/EN WP 173, Opinion 3/2010 on the principle of accountability, July 2010 — Asia Pacific Economic Cooperation Forum Doc No. 2010/SOM3/ECSG/DPS/003 (“51 Questions” ) – September 2010 — India Ministry of Communications and Information Technology, Data Security and Privacy Final Rules – April — Digital Agenda for Europe, COM(2010) 245 final/2 – August 2010 — China “Multi-Level Protection Scheme”- MLPS — U.S. Proposed Cybersecurity Legislation -critical infrastructures and government systems — Industry Initiatives – Cloud Security Alliance, Kantara Initiative, Open Identity Exchange, Open ID Foundation — Standards Initiatives Focusing on policy level security, privacy and trust management – ISO/IEC, ITU-T, ETSI, OASIS….

OASIS IDtrust Member Section –Technical Committee Work Underway — Key Management Interoperability Protocol (KMIP) — OASIS Digital Signature Services eXtended (DSS-X) — Identity in the Cloud Technical Committee (IDCloud) — Open Reputation Management Systems Technical Committee (ORMS) — Privacy Management Reference Model Technical Committee (PMRM)

thank you