report on sig ism
play

Report on SIG-ISM Peter Szegedi, GANT Association Last TF-NOC - PowerPoint PPT Presentation

Report on SIG-ISM Peter Szegedi, GANT Association Last TF-NOC meeting in Cambridge How do we deal with NOC security incidents? Roundtable chaired by Jonny Lundin (NORDUnet) What does TF-CSIRT do (Lionel Ferette - remote)


  1. Report on SIG-ISM Peter Szegedi, GÉANT Association

  2. Last TF-NOC meeting in Cambridge • How do we deal with NOC security incidents? Roundtable chaired by Jonny Lundin (NORDUnet) • What does TF-CSIRT do (Lionel Ferette - remote) • Introduction to the TERENA CISO group (James Davis) • UK National Crime Agency • Discussion about NOC security incidents and NREN security policies in general • NREN Security Strategy Workshop & TERENA CISO SIG kick-off • 3-4 September 2014, Utrecht, Netherlands • ISM-SIG has been created. 2

  3. Information Security Management • Reaching a shared view about international collaboration among NRENs on security, privacy and trust was the main aim of the workshop. • The formation of the new SIG provides a platform for future collaboration in this area. • Parallel group discussions were dedicated to the topics of security, privacy & trust strategy, knowledge sharing, trust frameworks, security services, international collaboration and organising the work of Chief Information Security Officers. • The workshop concluded that harmonisation of strategies is needed, checklists can serve as the simplest security framework for products and services, and 'share with care' is an important maxim. 3

  4. SIG - Information Security Management SIG format with Steering Committee: • Alf Moens (SURF) • Wayne Routly (DANTE) • Rolf Sture Normann (UNINETT) • James Davis (JANET) Closed collaboration with TF-CSIRT, TF-NOC, and TF-MSP 4

  5. Security landscape of GÉANT Ass. • TF-CSIRT • Formal membership (open for commercials), representation and processes. • Trusted Introducer : • Listed (support from two) • Accredited (fee ~1000 EUR/year) • Certified (SIM3 Model 45 parameters) • TRANSITS I and II (discount for TI members) • Recognized by ENISA / FIRST • Regular collaborations and co-location of meetings. 5

  6. Security landscape of GÉANT Ass. NREN space Security space TF-MSP SIG-ISM ENISA Technical penetration TF-NOC TF-CSIRT (SIG-NOC) TI TRANSITS FIRST 6

  7. How to continue... • SIG-NOC from April 2014 • Develop training course(s) for NOC personnel... • TRANSITS I (based on the survey results) • Plus advanced/recommended training(s) including... • ITIL ??? • .... • The aim would be to bring as many NOC personnel as possible up to the ”standard” level... • How to define the ”standard” level??? • Brainstorming maybe next time... • Develop a NOC registry... • What information is mandatory, recommended, optional ??? 7

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend