SlideShare a Scribd company logo
1 of 9
Download to read offline
Architecture Framework Advisory
Committee Update
Presentation to the Information Technology Infrastructure
Roundtable
October 7, 2014
Benoît Long, Senior Assistant Deputy Minister, Transformation,
Service Strategy and Design and Chair of the Architecture
Framework Advisory Committee
Outline
Context:
Architecture Framework Advisory Committee (AFAC)
Meetings and Topics
AFAC Consultation Roadmap on Cyber and IT Security
Device Security
Objectives
Defined
What Shared Services Canada (SSC) Has Heard
Next Steps
2
3
Workplace Technology Devices
SHAREDSERVICESCANADAOUTCOMESAFACMEETINGS
Cyber and IT
Security
Framework and
Device Security
Cloud Security Future Meeting Topics –
timing to be confirmed*
Jan 20 Feb 24 July 7 Sept 8 Nov 4 Dec 1
2014
2014
Context – Architecture Framework Advisory
Committee Meetings and Topics
2015
Mar 14 Apr 16 May 26
 Cyber and IT
Framework and
Device Security
Defined
Sept 2014
 Enterprise
Architecture library
available on SSC
Internet site
Feb 2014
• Architecture Standards
• SSC Infrastructure as a
Service (IaaS) and Platform
as a Service (PaaS)
• Directories
• IT Security Standards
2014
Architecture Framework Advisory Committee’s
Consultation Roadmap – Cyber and IT Security
STRATEGY KEY ACTIVITIES
2014–15
AFAC INPUT
 Recommendations
for Strategic
Questions
 Guiding Principles/
Best Practices
 Experience/Case
Studies
 Risks/Success
Factors
Cyber and IT
Security
Framework/ Device
Security
Service Bundles
and Delivery Model
Licensing Models
and Solutions
Framework and
End-State Service
Strategy
Enterprise
Procurement
Functional
Direction
• Meetings
• Demos
• Written
Submissions
Formal
Industry
Engagement
July 7
To Be
Determined
4
Sept 8
Nov 4
Dec 1
Cloud Security
Strategy (including
Device Security)
Device Security – Objectives
5
• Enhance security services required to mitigate from evolving
threats
• Support for security service integration with new cloud and
mobile technologies
• Support Treasury Board’s IT Policy Implementation Notice
(ITPIN) implementation regarding the secure use of portable
data storage devices within the Government of Canada
• Address the need for an enterprise procurement vehicle for
device security software
• Existing device security software licenses renewal to maintain
operations (e.g. Keeping the Lights On)
• Multiple device security disparate solutions and policy
application
• Standardization to drive efficiencies and cost savings across
the GC
Increase Security
Improve Service
Generate Savings
Device Security – Defined
What is Device Security?
• Device security refers to the protection of Government of Canada (GC)
devices that are used to store and process data through the use of
various information technology (IT) safeguard services.
What GC Devices are we looking to protect?
• Backend devices (Data Server Infrastructure)
• Frontend devices (Traditional personal computers, laptops, Thin-
Clients/Virtual Deployments)
• Mobile Devices (Smartphones, Tablets)
• ~569,000 devices (~100,000 data centre devices, ~469,000 workplace
technology devices)
Why do we need Device Security?
• Safeguard GC devices and data from various forms of malware and
intrusion
• Maintain the confidentiality, integrity and availability of infrastructure
information assets
6
What Shared Services Canada Heard from the
Architecture Framework Advisory Committee
Address “legacy” requirements separately from “end state”
De-couple procurements for DC and WTD as their security requirements are
different
Security continuously evolving to meet endlessly changing landscape
Transition from network to data centric approach
Cloud Security increases requirements for data encryption
Build a centralised public key infrastructure (PKI)/certificate authorities
Leverage “location based” data access (e.g. no Protected B in a public
zone)
Develop and enforce hardening and standards
Metrics are crucial – defines how success is measured
Look into behavioural security analysis for advanced attack detection
Investigate sandbox and isolation techniques (micro-segmentation)
7
Revised Device Security Strategy
Address legacy requirements by leveraging existing
procurement vehicles
De-couple data centre and WTD device security strategy
efforts
Develop a Cloud Security Strategy that incorporates device
security
Holistic approach across IT security domains
Integrate security services & strategies
Data centric approach
Continue consulting industry
8
Next Steps
In early November, SSC plans to further explore cloud security
with AFAC members
At the next IT Infrastructure Roundtable meeting, return with
feedback and advice from AFAC sessions on cloud security
9

More Related Content

What's hot

Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosAmazon Web Services
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...mfrancis
 
Data, Big Data and real time analytics for Connected Devices
Data, Big Data and real time analytics for Connected DevicesData, Big Data and real time analytics for Connected Devices
Data, Big Data and real time analytics for Connected DevicesSrinath Perera
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-enKBIZEAU
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume todayNana Owusu
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / TopologyNEEVEE Technologies
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?Mario Drobics
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCimetrics Inc
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesVaibhav Khanna
 
call for papers - International Journal on Cryptography and Information Secur...
call for papers - International Journal on Cryptography and Information Secur...call for papers - International Journal on Cryptography and Information Secur...
call for papers - International Journal on Cryptography and Information Secur...JonesSmith7
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT OutsourcingMultiTech IT
 
Cybermss cap statement v1
Cybermss cap statement v1Cybermss cap statement v1
Cybermss cap statement v1Cory Coleman
 
Protective Monitoring
Protective MonitoringProtective Monitoring
Protective Monitoringjohandev
 

What's hot (20)

Security fundamentals
Security fundamentalsSecurity fundamentals
Security fundamentals
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
Slides for CC & IAAS
Slides for CC & IAASSlides for CC & IAAS
Slides for CC & IAAS
 
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
Mobile Middleware and Mobility in the Enterprise - Yad Jaura, Marketing Manag...
 
Data, Big Data and real time analytics for Connected Devices
Data, Big Data and real time analytics for Connected DevicesData, Big Data and real time analytics for Connected Devices
Data, Big Data and real time analytics for Connected Devices
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-en
 
Towards a Privacy-Friendly Internet of Things
Towards a Privacy-Friendly Internet of ThingsTowards a Privacy-Friendly Internet of Things
Towards a Privacy-Friendly Internet of Things
 
Nana Owusu resume today
Nana Owusu resume todayNana Owusu resume today
Nana Owusu resume today
 
Internet of Things Architecture / Topology
Internet of Things Architecture / TopologyInternet of Things Architecture / Topology
Internet of Things Architecture / Topology
 
eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?eHealth ….. How to trust a cloud?
eHealth ….. How to trust a cloud?
 
Cybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect CimetricsCybersecurity Summit AHR20 Protect Cimetrics
Cybersecurity Summit AHR20 Protect Cimetrics
 
A. leng development of telehealth hub infrastructure in yorkshire
A. leng development of telehealth hub infrastructure in yorkshireA. leng development of telehealth hub infrastructure in yorkshire
A. leng development of telehealth hub infrastructure in yorkshire
 
Data Security
Data SecurityData Security
Data Security
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Cloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challengesCloud computing 10 cloud security advantages and challenges
Cloud computing 10 cloud security advantages and challenges
 
IoT-A ARM
IoT-A ARMIoT-A ARM
IoT-A ARM
 
call for papers - International Journal on Cryptography and Information Secur...
call for papers - International Journal on Cryptography and Information Secur...call for papers - International Journal on Cryptography and Information Secur...
call for papers - International Journal on Cryptography and Information Secur...
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
 
Cybermss cap statement v1
Cybermss cap statement v1Cybermss cap statement v1
Cybermss cap statement v1
 
Protective Monitoring
Protective MonitoringProtective Monitoring
Protective Monitoring
 

Viewers also liked

7464 Movie Maker How To Guide Mtl
7464  Movie Maker  How To  Guide Mtl7464  Movie Maker  How To  Guide Mtl
7464 Movie Maker How To Guide Mtlmlofton62
 
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...KBIZEAU
 
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...KBIZEAU
 
Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015KBIZEAU
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-enKBIZEAU
 
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...KBIZEAU
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2KBIZEAU
 
Pablo sobrino smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino   smart-dps presentation to itac - march 4-2014 - englishPablo sobrino   smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino smart-dps presentation to itac - march 4-2014 - englishKBIZEAU
 
2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canadaKBIZEAU
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maorShahar Geiger Maor
 
7464 Pb Lactivities Mtl
7464 Pb Lactivities Mtl7464 Pb Lactivities Mtl
7464 Pb Lactivities Mtlmlofton62
 
Resilience Design Toolkit. 50 Ingredients for Sustainable Business Model Inno...
Resilience Design Toolkit. 50 Ingredients for Sustainable Business Model Inno...Resilience Design Toolkit. 50 Ingredients for Sustainable Business Model Inno...
Resilience Design Toolkit. 50 Ingredients for Sustainable Business Model Inno...Sebastiaan de Neubourg
 
Psy 320 Secretary
Psy 320 SecretaryPsy 320 Secretary
Psy 320 SecretaryMariaRClark
 

Viewers also liked (20)

7464 Movie Maker How To Guide Mtl
7464  Movie Maker  How To  Guide Mtl7464  Movie Maker  How To  Guide Mtl
7464 Movie Maker How To Guide Mtl
 
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
Annual Check Up: One Year Follow-Up Regarding Shared Services Canada, IT Mode...
 
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
Leveraging Procurement for Socio-Economic Benefits - Presentation by Acting C...
 
Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015Shared Services Canada - Reports on Plans and Priorities 2014-2015
Shared Services Canada - Reports on Plans and Priorities 2014-2015
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-en
 
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
Shared Services Canada - Architect Framework Advisory Committee WTD Session 5...
 
Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2Afac device-security-july-7-2014v7-2
Afac device-security-july-7-2014v7-2
 
Pablo sobrino smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino   smart-dps presentation to itac - march 4-2014 - englishPablo sobrino   smart-dps presentation to itac - march 4-2014 - english
Pablo sobrino smart-dps presentation to itac - march 4-2014 - english
 
2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada2014 sept-9-shared-services-canada
2014 sept-9-shared-services-canada
 
Information security stki summit 2012-shahar geiger maor
Information security  stki summit 2012-shahar geiger maorInformation security  stki summit 2012-shahar geiger maor
Information security stki summit 2012-shahar geiger maor
 
Club It
Club ItClub It
Club It
 
Hour Of Prayer
Hour Of  PrayerHour Of  Prayer
Hour Of Prayer
 
John 316
John 316John 316
John 316
 
Luke 856
Luke 856Luke 856
Luke 856
 
7464 Pb Lactivities Mtl
7464 Pb Lactivities Mtl7464 Pb Lactivities Mtl
7464 Pb Lactivities Mtl
 
collins vita 0915
collins vita 0915collins vita 0915
collins vita 0915
 
S1 L5
S1 L5S1 L5
S1 L5
 
Resilience Design Toolkit. 50 Ingredients for Sustainable Business Model Inno...
Resilience Design Toolkit. 50 Ingredients for Sustainable Business Model Inno...Resilience Design Toolkit. 50 Ingredients for Sustainable Business Model Inno...
Resilience Design Toolkit. 50 Ingredients for Sustainable Business Model Inno...
 
Galatians 5
Galatians 5Galatians 5
Galatians 5
 
Psy 320 Secretary
Psy 320 SecretaryPsy 320 Secretary
Psy 320 Secretary
 

Similar to Itir oct0714-afac report-en

AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014KBIZEAU
 
Richard Wright resume IT2
Richard Wright resume IT2Richard Wright resume IT2
Richard Wright resume IT2Richard Wright
 
FIWARE Global Summit - Building Personalized FIWARE Enabled IoT Sandbox Solution
FIWARE Global Summit - Building Personalized FIWARE Enabled IoT Sandbox SolutionFIWARE Global Summit - Building Personalized FIWARE Enabled IoT Sandbox Solution
FIWARE Global Summit - Building Personalized FIWARE Enabled IoT Sandbox SolutionFIWARE
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slidesSteve Arnold
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingInside Analysis
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Cisco Enterprise Networks
 
TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Securitycarl yu
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Cisco DevNet
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeCloudHesive
 
Derive Overview
Derive OverviewDerive Overview
Derive Overviewwrochford
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionCisco Mobility
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfChinatu Uzuegbu
 

Similar to Itir oct0714-afac report-en (20)

Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  YrsFinto InfoSec ExIBM- CISSP ITIL CCSP CCIE  JNCIS MCP 8.5  Yrs
Finto InfoSec ExIBM- CISSP ITIL CCSP CCIE JNCIS MCP 8.5 Yrs
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
Richard Wright resume IT2
Richard Wright resume IT2Richard Wright resume IT2
Richard Wright resume IT2
 
FIWARE Global Summit - Building Personalized FIWARE Enabled IoT Sandbox Solution
FIWARE Global Summit - Building Personalized FIWARE Enabled IoT Sandbox SolutionFIWARE Global Summit - Building Personalized FIWARE Enabled IoT Sandbox Solution
FIWARE Global Summit - Building Personalized FIWARE Enabled IoT Sandbox Solution
 
Scott A Boggs
Scott A BoggsScott A Boggs
Scott A Boggs
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
 
Paper1
Paper1Paper1
Paper1
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of Everything
 
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
Speed Hybrid WAN Deployment with the New Cisco Intelligent WAN Design Guide -...
 
TIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_SecurityTIANQIANG_Carl_Network_Security
TIANQIANG_Carl_Network_Security
 
Xaas infotech (2)
Xaas infotech (2)Xaas infotech (2)
Xaas infotech (2)
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
 
NSC presentation
NSC presentationNSC presentation
NSC presentation
 
Derive Overview
Derive OverviewDerive Overview
Derive Overview
 
Mobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solutionMobilize employees with the cisco mobile workspace solution
Mobilize employees with the cisco mobile workspace solution
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Securing The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdfSecuring The Clouds with The Standard Best Practices-1.pdf
Securing The Clouds with The Standard Best Practices-1.pdf
 

More from KBIZEAU

Review of the Collaborative Procurement Process
Review of the Collaborative Procurement ProcessReview of the Collaborative Procurement Process
Review of the Collaborative Procurement ProcessKBIZEAU
 
Delivering Public Sector Innovation
Delivering Public Sector InnovationDelivering Public Sector Innovation
Delivering Public Sector InnovationKBIZEAU
 
Government of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning PresetationGovernment of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning PresetationKBIZEAU
 
Hill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanadaHill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanadaKBIZEAU
 
Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014KBIZEAU
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-enKBIZEAU
 
Ssc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business planSsc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business planKBIZEAU
 
2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-enKBIZEAU
 
2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-enKBIZEAU
 
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_ConsolidatedNetwork Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_ConsolidatedKBIZEAU
 
SSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance ObjectivesSSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance ObjectivesKBIZEAU
 
Workplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeWorkplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeKBIZEAU
 
Future Role of the CIO
Future Role of the CIO Future Role of the CIO
Future Role of the CIO KBIZEAU
 
“Increase Value of IT Services Through Application Portfolio Management” deli...
“Increase Value of IT Services Through Application Portfolio Management” deli...“Increase Value of IT Services Through Application Portfolio Management” deli...
“Increase Value of IT Services Through Application Portfolio Management” deli...KBIZEAU
 
Shared Services Canada - Transformation Initiatives
Shared Services Canada - Transformation InitiativesShared Services Canada - Transformation Initiatives
Shared Services Canada - Transformation InitiativesKBIZEAU
 
Ssc sep 24_2013_industry_engagement_day_notice_-_en (1)
Ssc sep 24_2013_industry_engagement_day_notice_-_en (1)Ssc sep 24_2013_industry_engagement_day_notice_-_en (1)
Ssc sep 24_2013_industry_engagement_day_notice_-_en (1)KBIZEAU
 
Itac itc supply chain council introductory meeting june 11 2013 with ssc f ...
Itac itc supply chain council   introductory meeting june 11 2013 with ssc f ...Itac itc supply chain council   introductory meeting june 11 2013 with ssc f ...
Itac itc supply chain council introductory meeting june 11 2013 with ssc f ...KBIZEAU
 
Dcc ied presentations_july_17_2013_-_en
Dcc ied presentations_july_17_2013_-_enDcc ied presentations_july_17_2013_-_en
Dcc ied presentations_july_17_2013_-_enKBIZEAU
 
July 9 ssc_gc_net_wan_service_industry_day_slides
July 9 ssc_gc_net_wan_service_industry_day_slidesJuly 9 ssc_gc_net_wan_service_industry_day_slides
July 9 ssc_gc_net_wan_service_industry_day_slidesKBIZEAU
 
Procurement - A Reflection on 2012-2013 and the Way Forward
Procurement - A Reflection on 2012-2013 and the Way ForwardProcurement - A Reflection on 2012-2013 and the Way Forward
Procurement - A Reflection on 2012-2013 and the Way ForwardKBIZEAU
 

More from KBIZEAU (20)

Review of the Collaborative Procurement Process
Review of the Collaborative Procurement ProcessReview of the Collaborative Procurement Process
Review of the Collaborative Procurement Process
 
Delivering Public Sector Innovation
Delivering Public Sector InnovationDelivering Public Sector Innovation
Delivering Public Sector Innovation
 
Government of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning PresetationGovernment of Canada Integrated IT Planning Presetation
Government of Canada Integrated IT Planning Presetation
 
Hill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanadaHill timesarticle sharedservicescanada
Hill timesarticle sharedservicescanada
 
Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014Transformation overview-final-oct-7-2014
Transformation overview-final-oct-7-2014
 
Ssac summary-report-2014-en
Ssac summary-report-2014-enSsac summary-report-2014-en
Ssac summary-report-2014-en
 
Ssc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business planSsc 2014 2015 integrated business plan
Ssc 2014 2015 integrated business plan
 
2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en2014 june-11-transformation-plan-update-en
2014 june-11-transformation-plan-update-en
 
2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en2014 june-11-update-on-ssc-priorities-and-activities-en
2014 june-11-update-on-ssc-priorities-and-activities-en
 
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_ConsolidatedNetwork Solutions Supply Chain Industry Day_May28_2014_Consolidated
Network Solutions Supply Chain Industry Day_May28_2014_Consolidated
 
SSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance ObjectivesSSC PSAB Policy w/Multiyear Performance Objectives
SSC PSAB Policy w/Multiyear Performance Objectives
 
Workplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) InitiativeWorkplace Technology Devices (WTD) Initiative
Workplace Technology Devices (WTD) Initiative
 
Future Role of the CIO
Future Role of the CIO Future Role of the CIO
Future Role of the CIO
 
“Increase Value of IT Services Through Application Portfolio Management” deli...
“Increase Value of IT Services Through Application Portfolio Management” deli...“Increase Value of IT Services Through Application Portfolio Management” deli...
“Increase Value of IT Services Through Application Portfolio Management” deli...
 
Shared Services Canada - Transformation Initiatives
Shared Services Canada - Transformation InitiativesShared Services Canada - Transformation Initiatives
Shared Services Canada - Transformation Initiatives
 
Ssc sep 24_2013_industry_engagement_day_notice_-_en (1)
Ssc sep 24_2013_industry_engagement_day_notice_-_en (1)Ssc sep 24_2013_industry_engagement_day_notice_-_en (1)
Ssc sep 24_2013_industry_engagement_day_notice_-_en (1)
 
Itac itc supply chain council introductory meeting june 11 2013 with ssc f ...
Itac itc supply chain council   introductory meeting june 11 2013 with ssc f ...Itac itc supply chain council   introductory meeting june 11 2013 with ssc f ...
Itac itc supply chain council introductory meeting june 11 2013 with ssc f ...
 
Dcc ied presentations_july_17_2013_-_en
Dcc ied presentations_july_17_2013_-_enDcc ied presentations_july_17_2013_-_en
Dcc ied presentations_july_17_2013_-_en
 
July 9 ssc_gc_net_wan_service_industry_day_slides
July 9 ssc_gc_net_wan_service_industry_day_slidesJuly 9 ssc_gc_net_wan_service_industry_day_slides
July 9 ssc_gc_net_wan_service_industry_day_slides
 
Procurement - A Reflection on 2012-2013 and the Way Forward
Procurement - A Reflection on 2012-2013 and the Way ForwardProcurement - A Reflection on 2012-2013 and the Way Forward
Procurement - A Reflection on 2012-2013 and the Way Forward
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Itir oct0714-afac report-en

  • 1. Architecture Framework Advisory Committee Update Presentation to the Information Technology Infrastructure Roundtable October 7, 2014 Benoît Long, Senior Assistant Deputy Minister, Transformation, Service Strategy and Design and Chair of the Architecture Framework Advisory Committee
  • 2. Outline Context: Architecture Framework Advisory Committee (AFAC) Meetings and Topics AFAC Consultation Roadmap on Cyber and IT Security Device Security Objectives Defined What Shared Services Canada (SSC) Has Heard Next Steps 2
  • 3. 3 Workplace Technology Devices SHAREDSERVICESCANADAOUTCOMESAFACMEETINGS Cyber and IT Security Framework and Device Security Cloud Security Future Meeting Topics – timing to be confirmed* Jan 20 Feb 24 July 7 Sept 8 Nov 4 Dec 1 2014 2014 Context – Architecture Framework Advisory Committee Meetings and Topics 2015 Mar 14 Apr 16 May 26  Cyber and IT Framework and Device Security Defined Sept 2014  Enterprise Architecture library available on SSC Internet site Feb 2014 • Architecture Standards • SSC Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) • Directories • IT Security Standards 2014
  • 4. Architecture Framework Advisory Committee’s Consultation Roadmap – Cyber and IT Security STRATEGY KEY ACTIVITIES 2014–15 AFAC INPUT  Recommendations for Strategic Questions  Guiding Principles/ Best Practices  Experience/Case Studies  Risks/Success Factors Cyber and IT Security Framework/ Device Security Service Bundles and Delivery Model Licensing Models and Solutions Framework and End-State Service Strategy Enterprise Procurement Functional Direction • Meetings • Demos • Written Submissions Formal Industry Engagement July 7 To Be Determined 4 Sept 8 Nov 4 Dec 1 Cloud Security Strategy (including Device Security)
  • 5. Device Security – Objectives 5 • Enhance security services required to mitigate from evolving threats • Support for security service integration with new cloud and mobile technologies • Support Treasury Board’s IT Policy Implementation Notice (ITPIN) implementation regarding the secure use of portable data storage devices within the Government of Canada • Address the need for an enterprise procurement vehicle for device security software • Existing device security software licenses renewal to maintain operations (e.g. Keeping the Lights On) • Multiple device security disparate solutions and policy application • Standardization to drive efficiencies and cost savings across the GC Increase Security Improve Service Generate Savings
  • 6. Device Security – Defined What is Device Security? • Device security refers to the protection of Government of Canada (GC) devices that are used to store and process data through the use of various information technology (IT) safeguard services. What GC Devices are we looking to protect? • Backend devices (Data Server Infrastructure) • Frontend devices (Traditional personal computers, laptops, Thin- Clients/Virtual Deployments) • Mobile Devices (Smartphones, Tablets) • ~569,000 devices (~100,000 data centre devices, ~469,000 workplace technology devices) Why do we need Device Security? • Safeguard GC devices and data from various forms of malware and intrusion • Maintain the confidentiality, integrity and availability of infrastructure information assets 6
  • 7. What Shared Services Canada Heard from the Architecture Framework Advisory Committee Address “legacy” requirements separately from “end state” De-couple procurements for DC and WTD as their security requirements are different Security continuously evolving to meet endlessly changing landscape Transition from network to data centric approach Cloud Security increases requirements for data encryption Build a centralised public key infrastructure (PKI)/certificate authorities Leverage “location based” data access (e.g. no Protected B in a public zone) Develop and enforce hardening and standards Metrics are crucial – defines how success is measured Look into behavioural security analysis for advanced attack detection Investigate sandbox and isolation techniques (micro-segmentation) 7
  • 8. Revised Device Security Strategy Address legacy requirements by leveraging existing procurement vehicles De-couple data centre and WTD device security strategy efforts Develop a Cloud Security Strategy that incorporates device security Holistic approach across IT security domains Integrate security services & strategies Data centric approach Continue consulting industry 8
  • 9. Next Steps In early November, SSC plans to further explore cloud security with AFAC members At the next IT Infrastructure Roundtable meeting, return with feedback and advice from AFAC sessions on cloud security 9