SlideShare a Scribd company logo
1 of 45
Jeremy Hilton and Anas Tawileh (C) Cardiff University
[object Object],[object Object],[object Object],[object Object],[object Object],(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University and much more..
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
(C) Cardiff University
[object Object],[object Object],[object Object],[object Object],(C) Cardiff University
[object Object],[object Object],[object Object],(C) Cardiff University
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],(C) Cardiff University
“ Others inspire us, information feeds us, practice improves our performance, but we need quiet time to figure things out, to emerge with new discoveries, to unearth original answers.” - Esther Buchholz (C) Cardiff University
(C) Cardiff University
[object Object],[object Object],[object Object],Tell me and I’ll forget Show me and I’ll remember Involve me and I’ll understand Old Chinese saying (C) Cardiff University
(C) Cardiff University
[object Object]
 
 
Creative Commons
 
Traffic Light Protocol Philosophy mapped to the Business Impact and Control Categories RED  SENSITIVITY  =  HIGHLY   SENSITIVE Personal for named recipients only WHITE  SENSITIVITY =  PUBLIC Unlimited Control (Apart from legal recourse) Uncontrolled AMBER  SENSITIVITY   =  SENSITIVE Limited distribution GREEN SENSITIVITY = NORMAL BUSINESS Business Community wide CATASTROPHIC Secured Segregated MATERIAL Secured MAJOR Restricted MINOR Controlled INSIGNIFICANT Controlled Developed to control information sharing between G8 countries, Business Impact levels added.
Generic “Org X”  Architecture Trust Model External Secured This zone is similar to the secured zone but is owned and operated by a business partner. The trust relationship between the Org X and the business partner is stronger than in the restricted zones.  Information Assets: Distributed to named individuals only. Secured This zone is the most secured area within the architecture. Access should be limited to highly trusted principals. Information Access limited to named principals only. External Restricted Similar to Restricted Zone but owned /operated by a business partner. The trust relationship is stronger that that in the External Controlled Zone. Information Access limited to Groups of authenticated principals Restricted The restricted Zone is the next higher level of security above Controlled. Access is Restricted to authenticated users or processes. Most data processing and storage occurs here. Information Access limited to pre-defined groups made up of authenticated principals. External Controlled Similar to Controlled Zone but owned /operated by an external organisation. Controlled This is where the lowest levels of control are applied to manage Information Assets with the prime goals of  managing Availability and Compliance Uncontrolled (Public) The uncontrolled environment outside the control of Org X. Managed  Belongs to IT and is used to administer servers, network devices and other managed devices. May be implemented with secure sessions (SSH) separate out of band networks or greater controls on Admin devices.
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],CA – Community Access RA – Restricted Access PI – Personal Information OO – Organisation Only ND – Non-Disclosure CG – Corporate Governance SD – Safe Disposal CU – Controlled Until AB – Authorised By ND – Non-Derivatives BY – Attribution cc cc
[object Object],Organisation Only
[object Object],[object Object],[object Object],Community   Access
[object Object],[object Object],Personal Information cc
[object Object],[object Object],[object Object],Non-Disclosure cc cc
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],cc cc DTG cc cc cc cc cc
Thank You

More Related Content

Similar to Sustainable Protection of Critical Corporate Information

QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7
Hong Sin Kwek
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
VITNetflix
 
Cracking the Code: Data Science Tackles Investment Management
Cracking the Code: Data Science Tackles Investment ManagementCracking the Code: Data Science Tackles Investment Management
Cracking the Code: Data Science Tackles Investment Management
Sharala Axryd
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
Anne Starr
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
mdagrossa
 
During week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docxDuring week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docx
jacksnathalie
 
Project Scenario You are a third party security consultant hired by t.docx
Project Scenario  You are a third party security consultant hired by t.docxProject Scenario  You are a third party security consultant hired by t.docx
Project Scenario You are a third party security consultant hired by t.docx
VictormxrPiperc
 

Similar to Sustainable Protection of Critical Corporate Information (20)

Cyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor uploadCyber presentation spet 2019 v8sentfor upload
Cyber presentation spet 2019 v8sentfor upload
 
Weakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chainWeakest links of an organization's Cybersecurity chain
Weakest links of an organization's Cybersecurity chain
 
How to Build a Privacy Program
How to Build a Privacy ProgramHow to Build a Privacy Program
How to Build a Privacy Program
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
Right-Sizing the Security and Information Assurance for Companies, a Core-ver...
 
ISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptxISMS End-User Training Presentation.pptx
ISMS End-User Training Presentation.pptx
 
QI Security Framework_v2007_7
QI Security Framework_v2007_7QI Security Framework_v2007_7
QI Security Framework_v2007_7
 
Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11Presentation to Irish ISSA Conference 12-May-11
Presentation to Irish ISSA Conference 12-May-11
 
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
Cracking the Code: Data Science Tackles Investment Management
Cracking the Code: Data Science Tackles Investment ManagementCracking the Code: Data Science Tackles Investment Management
Cracking the Code: Data Science Tackles Investment Management
 
Testing
TestingTesting
Testing
 
Dancyrityshy 1foundatioieh
Dancyrityshy 1foundatioiehDancyrityshy 1foundatioieh
Dancyrityshy 1foundatioieh
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
During week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docxDuring week 6 we develop the theory and application of capital bud.docx
During week 6 we develop the theory and application of capital bud.docx
 
Insider threat kill chain
Insider threat   kill chainInsider threat   kill chain
Insider threat kill chain
 
Project Scenario You are a third party security consultant hired by t.docx
Project Scenario  You are a third party security consultant hired by t.docxProject Scenario  You are a third party security consultant hired by t.docx
Project Scenario You are a third party security consultant hired by t.docx
 
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
Positive Hack Days. Christopher Gould. Head in the Clouds…Can we overcome sec...
 

More from Anas Tawileh (10)

A corpus linguistics based approach for estimating online content
A corpus linguistics based approach for estimating online contentA corpus linguistics based approach for estimating online content
A corpus linguistics based approach for estimating online content
 
Explaining the Digital Divide
Explaining the Digital DivideExplaining the Digital Divide
Explaining the Digital Divide
 
Managing Social Translation
Managing Social TranslationManaging Social Translation
Managing Social Translation
 
Youth in Technology for Community Development
Youth in Technology for Community DevelopmentYouth in Technology for Community Development
Youth in Technology for Community Development
 
Global Digital Divide - at the HICSS 2010
Global Digital Divide - at the HICSS 2010Global Digital Divide - at the HICSS 2010
Global Digital Divide - at the HICSS 2010
 
Explaining the Digital Divide
Explaining the Digital DivideExplaining the Digital Divide
Explaining the Digital Divide
 
Case Study in Arabic English Web
Case Study in Arabic English WebCase Study in Arabic English Web
Case Study in Arabic English Web
 
Knowledge Production and Dissemination in the Digital Era
Knowledge Production and Dissemination in the Digital EraKnowledge Production and Dissemination in the Digital Era
Knowledge Production and Dissemination in the Digital Era
 
ISSE 2008 Information Security Status
ISSE 2008 Information Security StatusISSE 2008 Information Security Status
ISSE 2008 Information Security Status
 
Lasilky.org
Lasilky.orgLasilky.org
Lasilky.org
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Sustainable Protection of Critical Corporate Information