Advanced SOC. Key Technologies for Security Operations. RSA Security Summit 2014 Advanced SOC. RSA Security Summit, 24 april 2014 Marcel Knippen

Size: px
Start display at page:

Download "Advanced SOC. Key Technologies for Security Operations. RSA Security Summit 2014 Advanced SOC. RSA Security Summit, 24 april 2014 Marcel Knippen"

Transcription

1

2 Advanced SOC Key Technologies for Security Operations RSA Security Summit, 24 april 2014 Marcel Knippen IT Security Experts Onsight External Use 2

3 Agenda Intro Onsight What s the need for an advanced SOC Define your goal The adaptive security model Challenges People, Processes & Technology IT Security Experts Onsight External Use 3

4 Intro Onsight Since 1999, 100% focus on IT Security Security for Enterprises Security Operations & Monitoring Security Solutions Delivery Committed to Customer Satisfaction Dutch company, 70 employees Security Operations Center ISAE 3402, ISO IT Security Experts Onsight External Use 4

5 What s the need for an advanced SOC Closed networks are transforming to open environments Fading borders: physical, ownership, responsibility, geographical IT becomes critical to business success Cost of threat impact is rising Management responsibility Incidents are occurring more and more Existing prevention capabilities are getting less effective Governance, Risk and Compliance IT Security Experts Onsight External Use 5

6 What s the need for an advanced SOC Incidents might occur reactive ad hoc Incident response Incidents will occur proactive process Continuous response IT Security Experts Onsight External Use 6

7 Define your goal What do you expect from your SOC? IT Security Experts Onsight External Use 7

8 IT Security Experts Onsight External Use 8

9 Clearly define your goal It s easy to get lost Average customer generates logs per day events per day. and growing Top down approach Start with (a subset of) management committed standards Clearly define the deliverables IT Security Experts Onsight External Use 9

10 Adaptive security model Foundation for the advanced SOC IT Security Experts Onsight External Use 10

11 Proactive security Exposure Predict Baseline Remediate Change Investigate Continuous Monitoring and Analyzing Isolate Divert Prevent Detect Prioritize Contain breach IT Security Experts Onsight External Use 11

12 Security resources: People and technology IT Security Experts Onsight External Use 12

13 Baseline systems Continuous re-baselining Discovery of devices, systems, services, identities, vulnerabilities,.. Predict attacks Understand the Attack Workflow Proactive exposure analyses New devices, applications and services come and go Are compensating controls needed? IT Security Experts Onsight External Use 13

14 故曰 : 知彼知己, 百戰不殆 ; 不知彼而知己, 一勝一負 ; 不知彼, 不知己, 每戰必殆 If you know your enemies and know yourself, you can win a hundred battles without a single loss. Sun Tzu, The Art of War IT Security Experts Onsight External Use 14

15 Know your enemy : Cyber Threats Agents (Attackers) Corporations Nation States Hacktivists Cyber Terrorists Cyber Criminals Cyber Fighters Script Kiddies Online Social Hackers Employees IT Security Experts Onsight External Use 15

16 Know their weapons: Top 10 Cyber Threats 1. Drive-by Downloads 2. Malicious Code: Worms/Trojans 3. Code Injection 4. Exploit Kits 5. Botnets 6. Physical Damage/Theft/Loss of media 7. Identity Theft/Fraud 8. Denial of Service 9. Data Breaches 10. Targeted Attacks Threat Landscape 2013 IT Security Experts Onsight External Use 16

17 Know how they operate? Attack Workflow Drive-by downloads Worms/Trojans IT Security Experts Onsight External Use 17

18 不知彼而知己 And know yourself Exposure Vulnerabilities Measures Assets Controls IT Security Experts Onsight External Use 18

19 Probability RSA Security Summit 2014 Advanced SOC Know yourself: Domain, Risk, Business Impact IT Domains - Critical Infrastructure - Cloud computing - Social Networking - E-commerce - Mobility - Office workplace - Trusted Infrastructure - Internet of things -. Impact IT Security Experts Onsight External Use 19

20 Isolate systems Reduce the attack surface Harden and segment (sub-)systems Default deny approach Firewall, App Control,, multi-layered Divert Attackers Gain time and knowledge Honeypots, Stealth layers,.. Prevent Incidents On Network, System, Application level Signature & behavioral prevention IT Security Experts Onsight External Use 20

21 Detect Incidents Shorten time to limit damage and loss of information Anomalies from normal patterns of behavior Connections from/to know bad entities Continuous Analytics Prioritize Risk Confirm risk with internal/external context Prioritize by risk to the enterprise Contain Incidents Isolate compromised systems, accounts,.. Prevent further incidents using same method IT Security Experts Onsight External Use 21

22 Investigate/Forensics Forensics, root cause and full scope analyses Retrospective analyses (motivation, what happened) Analyses of historical data with new insights Design/Model Change Prevent new attacks or reinfection of systems Design changes of policies or controls Remediate/Make change Implementation of change Enforcement of new policies and controls into firewall, IPS, Applications, network,. IT Security Experts Onsight External Use 22

23 Onsight SensorNet Continuous monitoring of customer s IT assets Systems, Apps, Users, Packets, Data, Flows,. Security Intelligence using visibility and real-time correlation (OSIX) Onsight SOC Multi-Domain SOC MSS Onsight DCs Collector + Sensor Collector + Sensor Collector + Sensor Mngmnt Customers Sensor Sensor Sensor Sensor FW, IDS,.. Customer A B C IT Security Experts Onsight External Use 24

24 Onsight SensorNet Asset Discovery Vulnerability Assessment Threat Detection Behavioral Monitoring Packet Capturing Log Collection IT Security Experts Onsight External Use 25

25 Onsight Security Intelligence exchange OSIX Threat Intelligence Signatures, Correlation Rules, Emerging Threats Community Intelligence OTX, IP reputation, Vendor Labs: RSA, Security Information: Advisories, News, NCSC, SANS,.. Vulnerability Information CVE, Zero-day,.. Context : GeoIP, Date, User, IT Security Experts Onsight External Use 26

26 Challenges People, Processes & Technology IT Security Experts Onsight External Use 28

27 Challenges People Authority and mandate Multiple disciplines/roles, limited resources Motivation and commitment Skills, experience and knowledge Organization: Career, position and salary Security clearance and background checks Communication skills (technical to business) IT Security Experts Onsight External Use 29

28 Challenges People IT Security Experts Onsight External Use 30

29 Challenges Processes Standards and processes Incident Response Continuous Response Integration of SOC processes into business processes Responsibility, authority and commitment Both technical and communication protocols Strict procedures versus flexibility Lenghty procedures versus fast response Innovation (Onsight Labs) IT Security Experts Onsight External Use 31

30 Challenges Processes Operational Analytical Business & Technology Call out Case Management Event Handling Monitoring On-boarding Shift Log Shift Turn Over Triage Event Analysis Incident Response Reporting Research Threat Intelligence Access Management Architecture Compliance DR/BCP Process Improvement Use Cases IT Security Experts Onsight External Use 32

31 Challenges Technology Tooling needed for monitoring, reporting, alarms, tickets, triage and forensics Integrate tooling with external security data Management of tooling (functional and technical) Big Data analytics IT Security Experts Onsight External Use 33

32 Challenges Other Defining business value of IT assets Legal challenges (privacy,..) Knowledge transfer Legacy aspects Interfacing to the business Budget versus investments, ROI Innovation of all layers IT Security Experts Onsight External Use 34

33 Challenges SOC as a Service Trust Expectations Connecting the service to your processes Responsibility and mandate Outsource your SOC does not outsource your responsibility Teamwork and commitment Management and coordination IT Security Experts Onsight External Use 35

34 Enterprise SOC or SOC as a Service IT Security Experts Onsight External Use 36

35 Thank you! Any questions? IT Security Experts Onsight External Use 38

36 IT Security Experts Onsight External Use 39

Vendor Risk Management

Vendor Risk Management Vendor Risk Management Using Big Data Analytics Marcel Knippen Onsight IT Security Experts IT Security Experts Onsight External Use 2 About Marcel Knippen Founder of Onsight Business Development About

More information

Keeping EGI secure. EGI CSIRT: Prevention - Response - Training

Keeping EGI secure. EGI CSIRT: Prevention - Response - Training Keeping EGI secure EGI CSIRT: Prevention - Response - Training Keeping EGI secure EGI CSIRT: Prevention - Response - Training EGI is a federated e-infrastructure set up to provide advanced computing, storage

More information

Where and How Data is Stored

Where and How Data is Stored Where and How Data is Stored Technology The OpenWater Platform is a proprietary system built on Microsoft.NET technologies. Its basis is 100% custom and is not derived from a popular system (e.g. DotNetNuke).

More information

EX0-008 exin. Number: EX0-008 Passing Score: 800 Time Limit: 120 min.

EX0-008 exin. Number: EX0-008 Passing Score: 800 Time Limit: 120 min. EX0-008 exin Number: EX0-008 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 Which statement describes Release Planning? A. After looking at all the stories in the backlog, the team estimates

More information

Threats From Within Are Now the #1 Concern for Most Healthcare Organizations

Threats From Within Are Now the #1 Concern for Most Healthcare Organizations Helen Blake, Executive Director, HIPAA Privacy and Security Office Client Profile The University of Miami Miller School of Medicine is comprised of three hospitals and a clinic system, serving more than 5

More information

WHITE PAPER A Framework for Cyber Threat Hunting

WHITE PAPER A Framework for Cyber Threat Hunting WHITE PAPER A Framework for Cyber Threat Hunting Sqrrl Data, Inc. 2016 All Rights Reserved TABLE OF CONTENTS I. INTRODUCTION - WHAT IS HUNTING? II. THE HUNTING MATURITY MODEL A. STEPS OF THE HMM B. AUTOMATION

More information

How to Define Your Systems and Assets to Support Reliability. How to Define Your Failure Reporting Codes to Support Reliability

How to Define Your Systems and Assets to Support Reliability. How to Define Your Failure Reporting Codes to Support Reliability BACKFED RELIABILITY How to Define Your Systems and Assets to Support Reliability How to Define Your Failure Reporting Codes to Support Reliability How to Generate Risk Prioritization Numbers (RPN) from

More information

The Myth of Automated Hunting and Case Studies in ICS

The Myth of Automated Hunting and Case Studies in ICS SANS Summit The Myth of Automated Hunting and Case Studies in ICS @DragosInc Who Are We Robert M. Lee @RobertMLee CEO and Founder, Dragos, Inc. SANS Institute Certified Instructor and Course Author (FOR578

More information

Digital empowerment for the Olympic Games

Digital empowerment for the Olympic Games Digital empowerment for the Olympic Games Trusted partner for your Digital Journey Turning the Games into a fully connected global experience Some business projects are large, complex, and critical to

More information

Accelerate Your Riverbed SteelHead Deployment and Time to Value

Accelerate Your Riverbed SteelHead Deployment and Time to Value SteelHead Implementation Service Accelerate Your Riverbed SteelHead Deployment and Time to Value Proven Methodologies to Increase Adoption and Utilization Your organization has selected SteelHead appliances

More information

Hunt Evil Your Practical Guide to Threat Hunting

Hunt Evil Your Practical Guide to Threat Hunting Hunt Evil Your Practical Guide to Threat Hunting Includes checklist, scorecard and examples Hunt Evil: Your Practical Guide to Threat Hunting 3 Chapters Part 1 Setting up your threat hunting program 1.

More information

The Hunter s. Handbook. Karen Scarfone, CISSP, ISSAP. Foreword by Jamie Butler. Endgame s Guide to Adversary Hunting

The Hunter s. Handbook. Karen Scarfone, CISSP, ISSAP. Foreword by Jamie Butler. Endgame s Guide to Adversary Hunting The Hunter s Handbook Endgame s Guide to Adversary Hunting Karen Scarfone, CISSP, ISSAP Foreword by Jamie Butler The Hunter's Handbook Endgame's Guide to Adversary Hunting Published by: CyberEdge Group,

More information

Connect with Confidence NO POWER NO PROBLEM

Connect with Confidence NO POWER NO PROBLEM Connect with Confidence NO POWER NO PROBLEM The ideal solution to implement wireless sensor monitoring in IoT applications where power is not available. At last, there s a roll-out ready way to implement

More information

Privacy Auditing in a Mixed McKesson Application Environment

Privacy Auditing in a Mixed McKesson Application Environment Privacy Auditing in a Mixed McKesson Application Environment Presentation materials in-line below The webinar replay link is available here June 11 th, 2009 FairWarning Trust but Verify http://www.fairwarningaudit.com

More information

Intelligent SUNTEX DC-5310(RS) Dissolved Oxygen Transmitter

Intelligent SUNTEX DC-5310(RS) Dissolved Oxygen Transmitter Intelligent SUNTEX DC-5310(RS) Dissolved Oxygen Transmitter Overview C % ppm 4~20mA Analog Output ppb Power Supply 100~240 VAC mg/l Dimensions 96 x 96 x 132mm RS-485 Digital Output (for DC-5310-RS only)

More information

Application Note AN-107

Application Note AN-107 SPEC Sensor TM Characterization & Calibration Considerations Scope This document is provided to describe the considerations needed to characterize, calibrate, verify and validate the measurement performance

More information

RCM CHIEF EXECUTIVE OFFICER & GENERAL SECRETARY Job Description and Person Specification

RCM CHIEF EXECUTIVE OFFICER & GENERAL SECRETARY Job Description and Person Specification RCM CHIEF EXECUTIVE OFFICER & GENERAL SECRETARY Job Description and Person Specification PURPOSE AND CONTEXT OF THE ROLE The key purpose of the Chief Executive will be to enhance the RCM s unique position

More information

<:\_J Senior Manager- Safety, Security & Emergency Response. Ell ORIGINAL DELIVERED BY COURIER. June 7, 2017

<:\_J Senior Manager- Safety, Security & Emergency Response. Ell ORIGINAL DELIVERED BY COURIER. June 7, 2017 ORIGINAL DELIVERED BY COURIER June 7, 2017 National Energy Board Suite 210, 517-10 th Avenue SW Calgary, Alberta T2R 0A8 Ell J 111 ' - 7 I Attention: Ms. Sheri Young Secretary of the Board Dear Ms. Young:

More information

AECAC 1 POSITION PAPER ON THE REVISION OF THE FIREARMS DIRECTIVE

AECAC 1 POSITION PAPER ON THE REVISION OF THE FIREARMS DIRECTIVE AECAC 1 POSITION PAPER ON THE REVISION OF THE FIREARMS DIRECTIVE CONTEXT By tabling a legislative proposal to amend the Firearms Directive, the Commission is putting forward a number of restrictions concerning

More information

Adaptability and Fault Tolerance

Adaptability and Fault Tolerance Adaptability and Fault Tolerance Rogério de Lemos University of Kent, UK Context: self-* and dependability; Focus: adaptability and fault tolerance; State of the art; Conclusions; Rogério de Lemos ICSE

More information

The Near Miss Project: Quantifying Cyclist Comfort and Safety

The Near Miss Project: Quantifying Cyclist Comfort and Safety The Near Miss Project: Quantifying Cyclist Comfort and Safety Thoughts on research, monitoring, and practice r.aldred@westminster.ac.uk Rachel Aldred rachelaldred.org @RachelAldred Content of talk Why

More information

WEALTH MANAGEMENT: ON YOUR TERMS

WEALTH MANAGEMENT: ON YOUR TERMS WEALTH MANAGEMENT: ON YOUR TERMS YOUR VISION FOR THE FUTURE While you actively build your personal wealth, it is also important to consider how you will protect those assets, generate income from them

More information

High usability and simple configuration or extensive additional functions the choice between Airlock Login or Airlock IAM is yours!

High usability and simple configuration or extensive additional functions the choice between Airlock Login or Airlock IAM is yours! High usability and simple configuration or extensive additional functions the choice between Airlock Login or Airlock IAM is yours! Airlock Login Airlock IAM When combined with Airlock WAF, Airlock Login

More information

2. Vision & Goals. Vision. Santa Rosa is a community where walking and bicycling are comfortable and convenient for people of all ages and abilities.

2. Vision & Goals. Vision. Santa Rosa is a community where walking and bicycling are comfortable and convenient for people of all ages and abilities. 2. Vision & Goals Overview The goals of the Santa Rosa Bicycle and Pedestrian Master Plan Update reflect the priorities expressed by the community throughout the public outreach phase of this Plan Update.

More information

INTRODUCTION UNIFIED COMMAND

INTRODUCTION UNIFIED COMMAND INTRODUCTION The Hazardous Materials organizational module is designed to provide an organizational structure that will provide necessary supervision and control for the essential functions required at

More information

TLN WRO Document. Back to Back CAS support

TLN WRO Document. Back to Back CAS support TELENET N.V. Page 1 of 8 TLN-WRO_GA_P_O_PDAA TLN WRO Document Back to Back CAS support TELENET N.V. Page 2 of 8 TLN-WRO_GA_P_O_PDAA Document Category and type CAT TYPE DOC ID TV General TLN_WRO_GA_P_O_PDAA

More information

ABRAXAS CORPORATION Date created: 2009 Updated: 2012

ABRAXAS CORPORATION Date created: 2009 Updated: 2012 ABRAXAS CORPORATION Date created: 2009 Updated: 2012 An intelligence contractor profile by Tim Shorrock, adapted from his book SPIES FOR HIRE: Inside the Secret World of Intelligence Outsourcing (Simon

More information

Role Profile. Chief Executive of Blackburn Youth Zone. Chair and Board of Blackburn Youth Zone

Role Profile. Chief Executive of Blackburn Youth Zone. Chair and Board of Blackburn Youth Zone Role Profile Job Role: Accountable to: Key Relationships: Chief Executive of Blackburn Youth Zone Chair and Board of Blackburn Youth Zone Youth Zone Chair and Board, Youth Zone Senior Management Team,

More information

Top Tips to Mitigate. Food Fraud COPYRIGHT ALL RIGHTS RESERVED.

Top Tips to Mitigate. Food Fraud COPYRIGHT ALL RIGHTS RESERVED. Top Tips to Mitigate Food Fraud COPYRIGHT 2017. ALL RIGHTS RESERVED. Today s Speakers Peter Claise Marketing Director Foods Programs Jeff Chilton Vice President of Professional Services Today s Discussion

More information

Why walk? Introducing Heart Foundation Walking! What is Heart Foundation Walking? Your role. Host Organisation

Why walk? Introducing Heart Foundation Walking! What is Heart Foundation Walking? Your role. Host Organisation An Introduction Why walk? It s an inexpensive form of physical activity It s easy doesn t require special skills or equipment It has psychological and community benefits improves mental health and social

More information

City of Redlands Disaster Council Minutes. Monday January 26 th, 2015 City Council Chambers 35 Cajon Street Redlands, CA 92373

City of Redlands Disaster Council Minutes. Monday January 26 th, 2015 City Council Chambers 35 Cajon Street Redlands, CA 92373 City of Redlands Disaster Council Minutes INTRODUCTIONS: Monday January 26 th, 2015 City Council Chambers 35 Cajon Street Redlands, CA 92373 Meeting called to order at 3:00pm Fay Glass welcomed everyone

More information

Scrum Portfolio jumshat.com

Scrum Portfolio jumshat.com Scrum Portfolio jumshat.com SCRUM is an iterative and incremental agile framework for managing complex projects. A scrum (short for scrummage) is a method of restarting play in rugby football. SCRUM Scrum

More information

Purpose and Need. For the. Strava Bicycle Data Project

Purpose and Need. For the. Strava Bicycle Data Project Purpose and Need For the Strava Bicycle Data Project April 2014 ODOT Strava Workgroup Margi Bradway*, Active Transportation Section Alex Bettenardi*, Transportation Planning Analysis Unit Phil Smith*,

More information

Australian Ice Hockey League Limited Privacy Policy

Australian Ice Hockey League Limited Privacy Policy Australian Ice Hockey League Limited Privacy Policy 1. AIHL Australian Ice Hockey League Ltd (ACN 114 658 123) of GPO Box 329, Melbourne VIC 3001 (AIHL) is the administrator of the Australian Ice Hockey

More information

IMD Governance Review at a glance

IMD Governance Review at a glance IMD Governance Review at a glance Good Governance at the International Olympic Committee Summary of recommendations 07 July 2017 1 Introduction IMD was officially contracted by the International Olympic

More information

T&E M&S War Game Results. Jim Hazlett Director, Mission Profiling Mission Innovation Raytheon Integrated Defense Systems

T&E M&S War Game Results. Jim Hazlett Director, Mission Profiling Mission Innovation Raytheon Integrated Defense Systems T&E M&S War Results Jim Hazlett Director, Mission Profiling Mission Innovation Raytheon Integrated Defense Systems Overview Purpose: Recent seminar war game for modeling and simulation (M&S) sponsor to

More information

Pedestrian Dynamics: Models of Pedestrian Behaviour

Pedestrian Dynamics: Models of Pedestrian Behaviour Pedestrian Dynamics: Models of Pedestrian Behaviour John Ward 19 th January 2006 Contents Macro-scale sketch plan model Micro-scale agent based model for pedestrian movement Development of JPed Results

More information

Common Myths of Gun Facts

Common Myths of Gun Facts California Rifle & Pistol Association is one of the oldest and most well-established civil rights and education organizations in the nation. The main goal of CRPA is to protect the rights of Californians

More information

INTERNATIONAL FOUNDATION MANIFESTA BID PROCEDURE MANIFESTA 14, 2022 VERSION 2 NOVEMBER 2016

INTERNATIONAL FOUNDATION MANIFESTA BID PROCEDURE MANIFESTA 14, 2022 VERSION 2 NOVEMBER 2016 INTERNATIONAL FOUNDATION MANIFESTA BID PROCEDURE MANIFESTA 14, 2022 VERSION 2 NOVEMBER 2016 2 1 MANIFESTA, THE EUROPEAN BIENNIAL OF CONTEMPORARY ART 1.1 Introduction Manifesta, the European Biennial of

More information

INTERNATIONAL ASSOCIATION OF ATHLETICS FEDERATIONS

INTERNATIONAL ASSOCIATION OF ATHLETICS FEDERATIONS INTERNATIONAL ASSOCIATION OF ATHLETICS FEDERATIONS ADVISORY NOTE USE OF PERSONAL INFORMATION Introduction 1. The IAAF is responsible for ensuring that the Personal Information that it processes in connection

More information

CONFLICT OF INTEREST POLICY

CONFLICT OF INTEREST POLICY Page 1 of 9 Version V01 10 December 2015 Page 2 of 9 Conflict of Interest Policy Version 01 Short description Relevant to Authority Responsible Unit/Department Policy on conflict of interests for IRB Barcelona

More information

Strategic Plan Update

Strategic Plan Update Archery GB 2017 Membership Conference The Future of our Sport Strategic Plan Update 2016-2020 Neil Armitage Chief Executive Vision Achieve. Grow. Believe. Mission Lead, grow and promote archery to create

More information

2013 Special Reliability Assessment: Accommodating an Increased Dependence on Natural Gas for Electric Power

2013 Special Reliability Assessment: Accommodating an Increased Dependence on Natural Gas for Electric Power 2013 Special Reliability Assessment: Accommodating an Increased Dependence on Natural Gas for Electric Power Special Reliability Assessments Deeper focus on issues identified in Long-Term Reliability Assessment

More information

IAAF ADVISORY NOTE USE OF PERSONAL INFORMATION (ANTI-DOPING AND INTEGRITY PROGRAMMES)

IAAF ADVISORY NOTE USE OF PERSONAL INFORMATION (ANTI-DOPING AND INTEGRITY PROGRAMMES) IAAF ADVISORY NOTE USE OF PERSONAL INFORMATION (ANTI-DOPING AND INTEGRITY PROGRAMMES) Introduction 1. The objects of the IAAF include (i) to develop and maintain programmes of detection, deterrence and

More information

Global Certifying Authority for Scrum and Agile Professionals

Global Certifying Authority for Scrum and Agile Professionals Global Certifying Authority for Scrum and Agile Professionals SCRUM is an iterative and incremental agile framework for managing complex projects. A scrum (short for scrummage) is a method of restarting

More information

PRESSURE SYSTEMS POLICY

PRESSURE SYSTEMS POLICY PRESSURE SYSTEMS POLICY PRESSURE SYSTEMS POLICY 1. Introduction 2. Policy Statement 3. Scope 4. Background 5. Roles & Responsibilities 6. Training 7. Contractors 8. Policy Review 1. Introduction The Kilmarnock

More information

Global Certifying Authority for Scrum and Agile Professionals. Authorized Training Partner

Global Certifying Authority for Scrum and Agile Professionals. Authorized Training Partner Global Certifying Authority for Scrum and Agile Professionals Authorized Training Partner SCRUM is an iterative and incremental agile framework for managing complex projects. A scrum (short for scrummage)

More information

ONSIGHT FIREWALL CONFIGURATION GUIDE

ONSIGHT FIREWALL CONFIGURATION GUIDE ONSIGHT FIREWALL CONFIGURATION GUIDE Librestream Onsight Firewall Configuration Guide Doc #: 400295-03, rev A January 2019 Information in this document is subject to change without notice. Reproduction

More information

ONSIGHT FIREWALL CONFIGURATION GUIDE

ONSIGHT FIREWALL CONFIGURATION GUIDE ONSIGHT FIREWALL CONFIGURATION GUIDE Librestream Onsight Firewall Configuration Guide Doc #: 400295-01, rev A January 2018 Information in this document is subject to change without notice. Reproduction

More information

CEPA Initiative: Response Time Guideline 2015 EMERGENCY SECURITY MANAGEMENT WORK GROUP

CEPA Initiative: Response Time Guideline 2015 EMERGENCY SECURITY MANAGEMENT WORK GROUP CEPA Initiative: Response Time Guideline 2015 EMERGENCY SECURITY MANAGEMENT WORK GROUP Response Time Guideline aboutpipelines.com 1 of 8 Contents Table of Contents 1.0 Background 3 Purpose 3 Scope 3 Definitions

More information

Asset Integrity. We must have effective asset integrity management.

Asset Integrity. We must have effective asset integrity management. Asset Integrity We must have effective asset integrity management. follow us Mon a ktwitter i n g t h@stepchangeinfo e U K t h e s a f e s t p l a c e t o w o r k i n t h e w o r l d w i d e o i l a n

More information

Use case Behind the scenes Holland Heineken House during the Olympic Winter Games PyeongChang 2018

Use case Behind the scenes Holland Heineken House during the Olympic Winter Games PyeongChang 2018 Use case Behind the scenes Holland Heineken House during the Olympic Winter Games Our standards for the Holland Heineken House are exceptionally high. We offer a wide range of amenities, including catering,

More information

PIQCS HACCP Minimum Certification Standards

PIQCS HACCP Minimum Certification Standards PIQCS HACCP Minimum Certification Standards In the EU, requirements for the hygiene of food is laid down in Regulation (EC) 852/2004. This regulation establishes general hygiene procedures for food at

More information

We re Blue Marlin Systems, a global provider of On-site and Offsite IT Outsourcing services.

We re Blue Marlin Systems, a global provider of On-site and Offsite IT Outsourcing services. We re Blue Marlin Systems, a global provider of On-site and Offsite IT Outsourcing services. O V E R V I E W Our mission, quite simply, is to form strategic alliances with our customers. We do so by providing

More information

future of mbe/mde/ mdd in the industry -- Open source is the only solution!

future of mbe/mde/ mdd in the industry -- Open source is the only solution! future of mbe/mde/ mdd in the industry -- Open source is the only solution! Presented by Francis Bordeleau francis.bordeleau@ericsson.com Outline Ericsson intro Modeling context Why open source? Impact

More information

Agile Methodology (Scrum Approach)

Agile Methodology (Scrum Approach) Agile Methodology (Scrum Approach) Scrum is a team of eight individuals in Rugby. Everyone in the pack acts as one with everyone else, to move the ball down the field in small incremental steps. Teams

More information

HazMat Response and Decontamination Exercise Evaluation Guide

HazMat Response and Decontamination Exercise Evaluation Guide Exercise Evaluation Guide Submittal HazMat Response and Decontamination Exercise Evaluation Guide As the evaluator you will need to submit your Observations, Recommendations and Performance Ratings into

More information

CONTINUITY OF SERVICE PLAN FOR THE LRIT SYSTEM

CONTINUITY OF SERVICE PLAN FOR THE LRIT SYSTEM E 4 ALBERT EMBANKMENT LONDON SE1 7SR Telephone: +44 (0)20 7735 7611 Fax: +44 (0)20 7587 3210 CONTINUITY OF SERVICE PLAN FOR THE LRIT SYSTEM MSC.1/Circ.1376/Rev.2 21 November 2014 1 The Maritime Safety

More information

THE NEW SPORTS ECOSYSTEM STEFAN KUERTEN EXECUTIVE DIRECTOR EBU SPORT

THE NEW SPORTS ECOSYSTEM STEFAN KUERTEN EXECUTIVE DIRECTOR EBU SPORT THE NEW SPORTS ECOSYSTEM STEFAN KUERTEN EXECUTIVE DIRECTOR EBU SPORT TRADITIONAL PLAYERS GOING GLOBAL There are a lot of experienced sharks out there Sky BeIn Sports Discovery Sports Agencies NEW PLAYERS

More information

Lecturers. Multi-Agent Systems. Exercises: Dates. Lectures. Prof. Dr. Bernhard Nebel Room Dr. Felix Lindner Room

Lecturers. Multi-Agent Systems. Exercises: Dates. Lectures. Prof. Dr. Bernhard Nebel Room Dr. Felix Lindner Room Lecturers Multi-Agent Systems Prof. Dr. Bernhard Nebel Room 52-00-028 Phone: 0761/203-8221 email: nebel@informatik.uni-freiburg.de Albert-Ludwigs-Universität Freiburg Dr. Felix Lindner Room 52-00-043 Phone:

More information

BODY-WORN CAMERAS ARE PAVING THE WAY FOR BETTER TRANSPARENCY AND A PROMISING FUTURE IN MUSKEGON HEIGHTS CASE STUDY MUSKEGON HEIGHTS POLICE DEPARTMENT

BODY-WORN CAMERAS ARE PAVING THE WAY FOR BETTER TRANSPARENCY AND A PROMISING FUTURE IN MUSKEGON HEIGHTS CASE STUDY MUSKEGON HEIGHTS POLICE DEPARTMENT BODY-WORN CAMERAS ARE PAVING THE WAY FOR BETTER TRANSPARENCY AND A PROMISING FUTURE IN MUSKEGON HEIGHTS CASE STUDY MUSKEGON HEIGHTS POLICE DEPARTMENT THE CHALLENGE IMPROVING PUBLIC SAFETY DESPITE BUDGET

More information

Current Bid Advertisements for Murray State University

Current Bid Advertisements for Murray State University Current Bid Advertisements for Murray State University Invitation to Bid/RFP # Advertisement Date Bid Advertisement Opening Date Opening Time Comments / Addendums MUR-268H-18 May 30, 2018 PROMOTIONAL PRODUCTS.

More information

Global Banking Issues and the Impact on Financial Services in The Bahamas. Presented by Governor John Rolle IBFS Summit 2 nd March, 2018

Global Banking Issues and the Impact on Financial Services in The Bahamas. Presented by Governor John Rolle IBFS Summit 2 nd March, 2018 Global Banking Issues and the Impact on Financial Services in The Bahamas Presented by Governor John Rolle IBFS Summit 2 nd March, 2018 2 Some High Level Observations Balance sheet adjustments have been

More information

FINAL PLAN APPENDIX D CITY OF BERKELEY BIKE PLAN D-1

FINAL PLAN APPENDIX D CITY OF BERKELEY BIKE PLAN D-1 CITY OF BERKELEY BIKE PLAN D-1 . Proposed Programs D.1. EDUCATION This appendix presents the recommended bicycle-related programs for the City of Berkeley. The recommendations are organized in four E s:

More information

Electrical, electronic and control engineering at the operational level

Electrical, electronic and control engineering at the operational level STCW Code Table A-III/6 Specification of minimum standard of for electro-technical officers Ref: https://www.edumaritime.net/stcw-code Source: IMO Function: Electrical, electronic and control engineering

More information

D-Case Modeling Guide for Target System

D-Case Modeling Guide for Target System D-Case Modeling Guide for Target System 1/32 Table of Contents 1 Scope...4 2 Overview of D-Case and SysML Modeling Guide...4 2.1 Background and Purpose...4 2.2 Target System of Modeling Guide...5 2.3 Constitution

More information

Some Steps Towards Climate-Ready Management of U.S. Fisheries

Some Steps Towards Climate-Ready Management of U.S. Fisheries Some Steps Towards Climate-Ready Management of U.S. Fisheries Roger Griffis 1, Wendy Morrison 1, Mark Nelson 1, Jon Hare 2, Valerie Termini 3 1 NOAA National Marine Fisheries Service, Silver Spring, MD,

More information

Policy. The Calico Group. Calico Homes. Calico Enterprise. SafeNet. Acorn Recovery Projects. Whitworth Care Trust

Policy. The Calico Group. Calico Homes. Calico Enterprise. SafeNet. Acorn Recovery Projects. Whitworth Care Trust Policy Title: Fencing Policy Author: Beth Gallagher Approved by: Board Date of First Issue: May 2011 Last full review date: February 2014 Updated: January 2016 Date of next review: February 2017 This document

More information

NOTICE: This publication is available at:

NOTICE: This publication is available at: Department of Commerce National Oceanic & Atmospheric Administration National Marine Fisheries Service NATIONAL MARINE FISHERIES SERVICE POLICY DIRECTIVE 01-118 February 12, 2015 Fisheries Management NATIONAL

More information

Racecourse Operations Manager. Position Description

Racecourse Operations Manager. Position Description Racecourse Operations Manager Position Description Position Discription Racecourse Operations Manager Position Title: Reports To: Business Unit: Department: Racecourse Operations Manager CEO Pakenham Racing

More information

FedRAMP Continuous Monitoring Performance Management Guide. Version 2.0

FedRAMP Continuous Monitoring Performance Management Guide. Version 2.0 FedRAMP Continuous Monitoring Performance Management Guide Version 2.0 January 31, 2018 DOCUMENT REVISION HISTORY DATE VERSION PAGE(S) DESCRIPTION AUTHOR 07/22/2015 1.0 All Initial document FedRAMP PMO

More information

Section 12. Information Technology (IT)

Section 12. Information Technology (IT) Section 12 Information Technology (IT) Key findings in the Information Technology (IT) performance measures reported optimistic changes in the respective IT environments for cities and counties alike.

More information

Helicopter Safety Recommendation Summary for Small Operators

Helicopter Safety Recommendation Summary for Small Operators Helicopter Safety Recommendation Summary for Small Operators Prepared by the International Helicopter Safety Team September 2009 Introduction This document is intended to provide a summary of the initial

More information

Toronto 2015 uses innovative technology to share the spirit of the games.

Toronto 2015 uses innovative technology to share the spirit of the games. Toronto 2015 uses innovative technology to share the spirit of the games. The 2015 Pan Am/Parapan Am Games were a major international multisport event that took place over 17 days in July and 9 days in

More information

MINE SAFETY TARGETED ASSESSMENT PROGRAM. Ground or strata failure NSW metalliferous mines. April

MINE SAFETY TARGETED ASSESSMENT PROGRAM. Ground or strata failure NSW metalliferous mines. April MINE SAFETY TARGETED ASSESSMENT PROGRAM Ground or strata failure NSW metalliferous mines April 2017 www.resourcesandenergy.nsw.gov.au Document control Publication title: Ground or strata failure NSW metalliferous

More information

CASE STUDY. Compressed Air Control System. Industry. Application. Background. Challenge. Results. Automotive Assembly

CASE STUDY. Compressed Air Control System. Industry. Application. Background. Challenge. Results. Automotive Assembly Compressed Air Control System Industry Automotive Assembly Application Savigent Platform and Industrial Compressed Air Systems Background This automotive assembly plant was using over 40,000 kilowatt hours

More information

Raise Your Hand If. Todays Cybersecurity Risks. June 14, WBA BOLT Summer Leadership Summit 1. May 4, 2018

Raise Your Hand If. Todays Cybersecurity Risks. June 14, WBA BOLT Summer Leadership Summit 1. May 4, 2018 WEALTH ADVISORY OUTSOURCING AUDIT, TAX, AND CONSULTING Investment advisory services are offered through CliftonLarsonAllen Wealth Advisors, LLC, an SEC registered investment advisor Todays Cybersecurity

More information

CRSA Conference Evidence Based Decision Making in European Football

CRSA Conference Evidence Based Decision Making in European Football CRSA Conference Evidence Based Decision Making in European Football UEFA Intelligence Centre Topics to cover WHAT is the Intelligence Centre? WHY an intelligence Centre & HOW created? WHAT strategic data

More information

Hands-on As a naturalistic data collection method

Hands-on As a naturalistic data collection method Hands-on As a naturalistic data collection method Jared Thomas, Darren Walton, Steven Murray, Martin Fourie Contact Information: Central Laboratories Opus International Consultants jared.thomas@opus.co.nz

More information

Security & Stability Advisory Committee. Update of Activities

Security & Stability Advisory Committee. Update of Activities Security & Stability Advisory Committee Update of Activities 1 Topics 1. Overview of the SSAC and Activities -- Patrik Fältström, SSAC Chair 2. Public Comments on SAC053: SSAC Report on Dotless Domains

More information

San Antonio Police Department. Open Carry Legislation Issues

San Antonio Police Department. Open Carry Legislation Issues San Antonio Police Department Open Carry Legislation Issues National Trends in Open Carry Texas is the 45 th state to allow some form of open carry. No permit is required to open carry in 30 states A permit

More information

Board Strategy Day. January 25, 2018

Board Strategy Day. January 25, 2018 Board Strategy Day January 25, 2018 Corporate Plan 2018-2022 & beyond Presentation to the board 2018 2022 & beyond 2 Building on the last five-year plan 2013 2017 21% reduction in subway delay minutes

More information

The RCM Analyst - Beyond RCM

The RCM Analyst - Beyond RCM The RCM Analyst - Beyond RCM darylm@strategic-advantages.com About the Author: Daryl Mather was originally trained in RCM in 1991, after which he was involved in the application of the method through a

More information

Resource Guide. Copyright 2017 Institute of Certified Management Accountants. Updated 8/30/17

Resource Guide. Copyright 2017 Institute of Certified Management Accountants. Updated 8/30/17 Resource Guide Copyright 2017 Institute of Certified Management Accountants Updated 8/30/17 RESOURCE GUIDE Institute of Certified Management Accountants Certified in Strategy and Competitive Analysis Exam

More information

Guidance Note. NXT Advisors

Guidance Note. NXT Advisors Guidance Note NXT Advisors February 2015 CONTENTS 1. Introduction 3 2. Accreditation 4 2.1 Application for accreditation 4 2.2 Accreditation process 4 2.3 Ongoing accreditation 5 2.4 Revoking a NXT Advisor

More information

EQUITY POLICY POLICY STATEMENT

EQUITY POLICY POLICY STATEMENT EQUITY POLICY POLICY STATEMENT Basketball Ontario, through its Board of Directors, is committed to fostering respect and dignity for each of its employees and members. This policy is intended to guarantee

More information

Process Safety Journey

Process Safety Journey Process Safety Journey Agenda The Status in early 2000s The Journey to improvement in Process Safety management Managing risks and barriers How has this impacted Kwinana? The Status in early 2000s Focus

More information

Paper Presentation: COMPLETE AND SIMULTANEOUS DCS FAILURE IN TWO 500MW UNITS

Paper Presentation: COMPLETE AND SIMULTANEOUS DCS FAILURE IN TWO 500MW UNITS INDIAN POWER STATIONS POWER PLANT O&M CONFERENCE - 2012 Paper Presentation: COMPLETE AND SIMULTANEOUS DCS FAILURE IN TWO 500MW UNITS K C Tripathy, DGM (C&I) Anoop K, Dy Manager (C&I) B K Rathore, Dy Manager

More information

Do you have the energy, drive and passion to deliver transformational growth in cricket participation?

Do you have the energy, drive and passion to deliver transformational growth in cricket participation? Job Title: Responsible to: Contract: Location: Head of Participation CEO Full-time, permanent Edinburgh Do you have the energy, drive and passion to deliver transformational growth in cricket participation?

More information

Toward Zero Deaths: Proactive Steps for Your Community

Toward Zero Deaths: Proactive Steps for Your Community Est. Dec. 2014 Toward Zero Deaths: Proactive Steps for Your Community Presented by: Brian Roberts, P.E., National Association of County Engineers Marie Walsh, Ph.D., Louisiana Local Technical Assistance

More information

Business Plan Presentation

Business Plan Presentation 2019 Department of Water Resources Business Plan Presentation Wednesday, August 29, 2018 Mission To Provide Superior Water Services at an Excellent Value Vision To be widely recognized as a leader in the

More information

CITY OF SAINT JOHN TRAFFIC CALMING POLICY

CITY OF SAINT JOHN TRAFFIC CALMING POLICY CITY OF SAINT JOHN TRAFFIC CALMING POLICY VERSION: 1.0 April 10, 2012 Pedestrians, Cyclists and Motorists Sharing Street Spaces CONTENTS INTRODUCTION... 3 POLICY GOAL... 3 POLICY OBJECTIVES... 3 GUIDING

More information

2013 STORM IMPLEMENTATION PLAN & ANNUAL RELIABILITY PERFORMANCE REPORTS

2013 STORM IMPLEMENTATION PLAN & ANNUAL RELIABILITY PERFORMANCE REPORTS 2013 STORM IMPLEMENTATION PLAN & ANNUAL RELIABILITY PERFORMANCE REPORTS FILED: March 3, 2014 2013 Storm Implementation Plan & Annual Reliability Performance Reports EXECUTIVE SUMMARY... 6 A) Initiative

More information

Distributed Control Systems

Distributed Control Systems Unit 41: Unit code Distributed Control Systems M/615/1509 Unit level 5 Credit value 15 Introduction With increased complexity and greater emphasis on cost control and environmental issues, the efficient

More information

2018 RED SOX FOUNDATION ULTIMATE RED SOX RAFFLE OFFICIAL RULES

2018 RED SOX FOUNDATION ULTIMATE RED SOX RAFFLE OFFICIAL RULES 2018 RED SOX FOUNDATION ULTIMATE RED SOX RAFFLE OFFICIAL RULES PURPOSE & NET PROCEEDS: The Red Sox Foundation, Inc. (hereafter known as Sponsor or Red Sox Foundation ), the official charity of the Boston

More information

ROSEE RSA/RSI Introduction courses ROSEE Speed Management courses

ROSEE RSA/RSI Introduction courses ROSEE Speed Management courses ROSEE RSA/RSI Introduction courses ROSEE Speed Management courses ROSEE PP8 UL FGG-PTI & WP4 leader Kostanjsek, Jure & Lipar, Peter Munchen, June 6, 2013 ROSEE WP4: Safe Roads and Mobility RSA/RSI course

More information

Hazard Communication Program

Hazard Communication Program Hazard Communication Program I. Purpose, Applicability, and Scope A. Purpose: The purpose of this program is to ensure that the hazards of chemicals used in the workplace are evaluated, and those hazards

More information

2018 New York Bike Summit

2018 New York Bike Summit 2018 New York Bike Summit -Education: Beyond the Rules of the Road- Set at the historic Gideon Putnam Hotel in beautiful Saratoga, New York, The 2018 New York State Bike Summit is bigger than ever! This

More information

Dockless Cycle Share

Dockless Cycle Share Dockless Cycle Share Code of Practice December 2017 135 Albert Street Private Bag 92300, Auckland 1142 aucklandcouncil.govt.nz Ph 09 301 0101 1. Introduction Auckland has seen a significant increase in

More information

A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems

A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems The First International Workshop on Cyber-Physical Networking Systems A Game Theoretic Study of Attack and Defense in Cyber-Physical Systems ChrisY.T.Ma Advanced Digital Sciences Center Illinois at Singapore

More information