SlideShare a Scribd company logo
Seminar Simplified Security
18 juni 2015
2
Agenda Simplified Security
17:00 Welkom en Introductie
17:10 Security Maturity Model
18:00 Diner
19:00 Security en IAM Roadmap Oracle
20:00 Demo Simplified Security processen
20:45 Discussie en conclusie
21:00 Borrel
4
5
6
7
Identiteit
19-juni-1972
BSN:186587485
23-12-1993
KvK 30114159
Vestigingsnr. 000017515769
8
Is onder de motorkap complex, maar….
leg dit niet neer bij de eindgebruiker, want…
dan wordt techniek misbruikt
Management van Security / Identity / Acces
9
10
Simplified Security Event 18-juni
Gertjan van het Hof
Security Maturity Evaluation
12
IT-security thema’s
Nederlandse organisaties 2015
Bron: Nationale IT Security Monitor
13
Beveiligingsmaatregelen
Cybercrime
Bron: Nationale IT Security Monitor
14
Klaar voor EU Data Protectie
Verordering?
Bron: Nationale IT Security Monitor
15Hoe krijg ik
de eisen
helder?
Uitstellen kan
eigenlijk niet
meer!
Hoe bepaal ik
de
prioriteiten?
Welke wetten
zijn van
toepassing?
Hoe hou ik de
kosten in de
hand?
Waar haal ik
de kennis
vandaan?
Welke
technology?
Hoe haak ik
de business
aan?Welke best
practices zijn
er?
Wat is de beste
aanpak?
16
Welke security aanpak?
NIST ISO/IEC OCTAVECOBIT
• Complex
• Intensief en langdurig traject
• Kostbaar
• Resultaten laten lang op zich wachten
• Technology mapping ontbreekt
17
AMIS Simplified Security
Aanpak
Security
Maturity
Evaluation
Advies
Security
Architectuur
Implementatie
van
maatregelen
Best Practices /
Ref. Architecture
Doorlooptijd: 1 maand
18
Waarom deze aanpak?
• Methode is technologie onafhankelijk
• Overzichtelijke aanpak
• Korte doorlooptijd
• Geeft snel inzicht in huidige Security Maturity en de te nemen stappen
• Prioritering / Roadmaps
• Laagdrempelige manier presentatie van resultaten
• Goede basis voor Security Architectuur en Implementatie
• Goede voorbereiding op NIST/ISO/enz.
19
Wat gaan we doen?
4-5 INTERVIEWS
1 PRESENTATIE
20
Interview’s met
9 verschillende rollen
• Interview 1:
– CISO
– HR
– Informatie Managers
– Enterprise Architect
• Interview 2:
– Lead Developer / Applicatie Architect
– Beheer (Operations)
– Database Administrator
• Interview 3:
– Risk & Compliance
– Audit
• 1 tot 2 verdiepingsinterview’s
 Presentatie aan interviewteam en CIO
21
Security Maturity Evaluation
Overview
Analyse
Business
Area’s
Technical
Area’s
Analyse
22
Security Maturity Evaluation
Overview
Business
Area’s
Technical
Area’s
Presentatie van resultaten
Opportunities Enablers
Recurring
Benefits
Priorities
Analyse
Business Area’s
23
Business Area’s
Business
Context
Technical
Context
Digital
Transfor-
mation
24
Business Context
Vragen:
• Gebruikers van de diensten
• Type implementatie
• Kritieke processen
• Kritieke data
• Bestaande gebreken
• Beschikbaarheid
• Vertrouwelijkheid
• Integriteit
• Sabotage
• Operationele risico's
• Reputatieschade
• Compliance
25
Technical Context
Vragen:
• Data Centers
• Data Center Organisatie
• Data Center AS IS and TO BE Technology
• Evolution plans and priorities
• High Availability, Business Continuity, Disaster recovery
• CMDB Configuratie Item’s
• Technology architectuur
26
Digital Transformation
Analyse
27
Security Maturity Evaluation
Overview
Business
Area’s
Technical
Area’s
Presentatie van resultaten
Opportunities Enablers
Recurring
Benefits
Priorities
28
Technical Area’s
DataSecurityLogicalSecurity
Analyse
29
Security Maturity Evaluation
Overview
Business
Area’s
Technical
Area’s
Presentatie van resultaten
Opportunities Enablers
Recurring
Benefits
Priorities
30
van Analyse naar
Business Resultaten
Opportunities Enablers
Recurring
Benefits
Analyse
CIA
Business Technical
31
Opportunities
Op basis van de Analyse worden Opportunities gevonden.
Voorbeeld van Analyse resultaten:
• There is no process for approval process delegation
• The user provision is performed manually for all applications
• There is no central department with responsibility to “enroll” and “un-enroll”
• Very few cases are notified for accounts de-provisioning (leave and move)
• Privileges are accumulated when users change division / job
Voorbeeld van Opportunities:
• Define and adopt a policy about the user creation management, role and
responsibilities including de-provisioning
• Start a regular process to check rogue accounts in applications and databases
• Make provisioning and deprovisioning automatic
32
Enablers
Voorbeelden:
• Policy and organization
• Extractors and reconciliation tools and/or Identity Analytics capabilities
• Identity Management technology
• Single Sign On tools
33
Recurring Benefits
Voorbeelden:
• Risk of data leakage and frauds reduced
• Better compliance through full accountability
• Better user experience and improved productivity
• Reduced number of call to help desk to reset passwords
• Reduced costs for Identity and Access Management
34
Van Enablers naar Capabilities
Enablers Capabilities
Voorbeelden van Capabilities:
• Data Encryption
• RBAC
• Automate Provisioning en De-provisioning
• Data Masking
• Auditing
• Single Sign On
35
Prioritering
36
Security Maturity (voorbeeld)
37
Oracle Product Mapping Advice
(voorbeeld)
38
AMIS Simplified Security
Aanpak
Security
Maturity
Evaluation
Advies
Security
Architectuur
Implementatie
van
maatregelen
Best Practices /
Ref. Architecture
Doorlooptijd: 1 maand
39
SABSA
ASSETS (what)
MOTIVATION (why)
PROCESS (how)
PEOPLE (who)
LOCATION (where)
TIME (when)
40
Conceptual
Security Architecture
41
Conceptual
Security Architecture
42
Component Security
Architecture
43
AMIS Simplified Security
Aanpak
Security
Maturity
Evaluation
Advies
Security
Architectuur
Implementatie
van
maatregelen
Best Practices /
Ref. Architecture
Doorlooptijd: 1 maand
44
Security Implementation
Partner
Middleware
• Oracle Identity & Access Manager
(OAM, OIM)
• Oracle Identity Federation (OIF)
• Oracle Web Service Security
(OWSM)
• Oracle Unified Directory (OUD)
• Oracle Privileged Account Manager
(OPAM)
• Oracle Key Vault (OKV)
• Oracle API Gateway
Database
• Oracle Database Firewall (DBFW)
• Oracle Database Vault (ODV)
• Oracle Data Masking
• Oracle Database Advanced Security
options (OAS)
– Transparent Data Encryption
– Oracle Data Redation
• Oracle Virtual Private Database
(VPD)
• Oracle Real Application Security
(RAS)
• Oracle Audit Vault (AV)
45
Wij staan er klaar voor!
U ook?
AMIS Security Practice
46
Dank voor uw aanwezigheid!
Gertjan van het Hof
Security Architect
AMIS
M +31 6 29 54 06 19
E gertjan.van.het.hof@amis.nl
I amis.nl
B technology.amis.nl
47

More Related Content

Viewers also liked

Practical insights in the day-to-day routine of an information security officer
Practical insights in the day-to-day routine of an information security officerPractical insights in the day-to-day routine of an information security officer
Practical insights in the day-to-day routine of an information security officer
Getting value from IoT, Integration and Data Analytics
 
Oracle OpenWorld 2014 Review Part One - Overview
Oracle OpenWorld 2014 Review Part One - OverviewOracle OpenWorld 2014 Review Part One - Overview
Oracle OpenWorld 2014 Review Part One - Overview
Getting value from IoT, Integration and Data Analytics
 
Marrying together the worlds of ADF and HTML5 & AngularJS - Oracle OpenWorld ...
Marrying together the worlds of ADF and HTML5 & AngularJS - Oracle OpenWorld ...Marrying together the worlds of ADF and HTML5 & AngularJS - Oracle OpenWorld ...
Marrying together the worlds of ADF and HTML5 & AngularJS - Oracle OpenWorld ...
Getting value from IoT, Integration and Data Analytics
 
Real-World Load Testing of ADF Fusion Applications Demonstrated - Oracle Ope...
Real-World Load Testing of ADF Fusion Applications Demonstrated  - Oracle Ope...Real-World Load Testing of ADF Fusion Applications Demonstrated  - Oracle Ope...
Real-World Load Testing of ADF Fusion Applications Demonstrated - Oracle Ope...
Getting value from IoT, Integration and Data Analytics
 
Embedding UX In Any project, AMIS UX Event
Embedding UX In Any project, AMIS UX EventEmbedding UX In Any project, AMIS UX Event
Embedding UX In Any project, AMIS UX Event
Getting value from IoT, Integration and Data Analytics
 
Oracle OpenWorld 2014 Review - Innovation tour
Oracle OpenWorld 2014 Review - Innovation tourOracle OpenWorld 2014 Review - Innovation tour
Oracle OpenWorld 2014 Review - Innovation tour
Getting value from IoT, Integration and Data Analytics
 
Security by Design by SeByDe
Security by Design by SeByDeSecurity by Design by SeByDe
Automated testing by Richard Olrichs and Wilfred vd Deijl
Automated testing by Richard Olrichs and Wilfred vd DeijlAutomated testing by Richard Olrichs and Wilfred vd Deijl
Automated testing by Richard Olrichs and Wilfred vd Deijl
Getting value from IoT, Integration and Data Analytics
 
ADF Performance Monitor
ADF Performance MonitorADF Performance Monitor
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Getting value from IoT, Integration and Data Analytics
 
Oracle documents cloud service
Oracle documents cloud serviceOracle documents cloud service
AMIS Oracle OpenWorld 2015 Review –part 1– Overview, Main Themes, Announcemen...
AMIS Oracle OpenWorld 2015 Review –part 1– Overview, Main Themes, Announcemen...AMIS Oracle OpenWorld 2015 Review –part 1– Overview, Main Themes, Announcemen...
AMIS Oracle OpenWorld 2015 Review –part 1– Overview, Main Themes, Announcemen...
Getting value from IoT, Integration and Data Analytics
 
Best Practices for Enterprise Continuous Delivery of Oracle Fusion Middlewa...
Best Practices for Enterprise Continuous Delivery of Oracle Fusion Middlewa...Best Practices for Enterprise Continuous Delivery of Oracle Fusion Middlewa...
Best Practices for Enterprise Continuous Delivery of Oracle Fusion Middlewa...
Getting value from IoT, Integration and Data Analytics
 
High density deployments using weblogic multitenancy
High density deployments using weblogic multitenancyHigh density deployments using weblogic multitenancy
High density deployments using weblogic multitenancy
Getting value from IoT, Integration and Data Analytics
 
AMIS definer invoker rights
AMIS definer invoker rightsAMIS definer invoker rights
Identity & Access Management
Identity & Access ManagementIdentity & Access Management
Kernel Recipes 2013 - Kernel for your device
Kernel Recipes 2013 - Kernel for your deviceKernel Recipes 2013 - Kernel for your device
Kernel Recipes 2013 - Kernel for your device
Anne Nicolas
 
Kernel Recipes 2013 - Automating source code evolutions using Coccinelle
Kernel Recipes 2013 - Automating source code evolutions using CoccinelleKernel Recipes 2013 - Automating source code evolutions using Coccinelle
Kernel Recipes 2013 - Automating source code evolutions using Coccinelle
Anne Nicolas
 
Distro Recipes 2013 : Debian and quality assurance
Distro Recipes 2013 : Debian and quality assuranceDistro Recipes 2013 : Debian and quality assurance
Distro Recipes 2013 : Debian and quality assurance
Anne Nicolas
 
Distro Recipes 2013 : My ${favorite_linux_distro} is slow!
Distro Recipes 2013 : My ${favorite_linux_distro} is slow!Distro Recipes 2013 : My ${favorite_linux_distro} is slow!
Distro Recipes 2013 : My ${favorite_linux_distro} is slow!
Anne Nicolas
 

Viewers also liked (20)

Practical insights in the day-to-day routine of an information security officer
Practical insights in the day-to-day routine of an information security officerPractical insights in the day-to-day routine of an information security officer
Practical insights in the day-to-day routine of an information security officer
 
Oracle OpenWorld 2014 Review Part One - Overview
Oracle OpenWorld 2014 Review Part One - OverviewOracle OpenWorld 2014 Review Part One - Overview
Oracle OpenWorld 2014 Review Part One - Overview
 
Marrying together the worlds of ADF and HTML5 & AngularJS - Oracle OpenWorld ...
Marrying together the worlds of ADF and HTML5 & AngularJS - Oracle OpenWorld ...Marrying together the worlds of ADF and HTML5 & AngularJS - Oracle OpenWorld ...
Marrying together the worlds of ADF and HTML5 & AngularJS - Oracle OpenWorld ...
 
Real-World Load Testing of ADF Fusion Applications Demonstrated - Oracle Ope...
Real-World Load Testing of ADF Fusion Applications Demonstrated  - Oracle Ope...Real-World Load Testing of ADF Fusion Applications Demonstrated  - Oracle Ope...
Real-World Load Testing of ADF Fusion Applications Demonstrated - Oracle Ope...
 
Embedding UX In Any project, AMIS UX Event
Embedding UX In Any project, AMIS UX EventEmbedding UX In Any project, AMIS UX Event
Embedding UX In Any project, AMIS UX Event
 
Oracle OpenWorld 2014 Review - Innovation tour
Oracle OpenWorld 2014 Review - Innovation tourOracle OpenWorld 2014 Review - Innovation tour
Oracle OpenWorld 2014 Review - Innovation tour
 
Security by Design by SeByDe
Security by Design by SeByDeSecurity by Design by SeByDe
Security by Design by SeByDe
 
Automated testing by Richard Olrichs and Wilfred vd Deijl
Automated testing by Richard Olrichs and Wilfred vd DeijlAutomated testing by Richard Olrichs and Wilfred vd Deijl
Automated testing by Richard Olrichs and Wilfred vd Deijl
 
ADF Performance Monitor
ADF Performance MonitorADF Performance Monitor
ADF Performance Monitor
 
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
 
Oracle documents cloud service
Oracle documents cloud serviceOracle documents cloud service
Oracle documents cloud service
 
AMIS Oracle OpenWorld 2015 Review –part 1– Overview, Main Themes, Announcemen...
AMIS Oracle OpenWorld 2015 Review –part 1– Overview, Main Themes, Announcemen...AMIS Oracle OpenWorld 2015 Review –part 1– Overview, Main Themes, Announcemen...
AMIS Oracle OpenWorld 2015 Review –part 1– Overview, Main Themes, Announcemen...
 
Best Practices for Enterprise Continuous Delivery of Oracle Fusion Middlewa...
Best Practices for Enterprise Continuous Delivery of Oracle Fusion Middlewa...Best Practices for Enterprise Continuous Delivery of Oracle Fusion Middlewa...
Best Practices for Enterprise Continuous Delivery of Oracle Fusion Middlewa...
 
High density deployments using weblogic multitenancy
High density deployments using weblogic multitenancyHigh density deployments using weblogic multitenancy
High density deployments using weblogic multitenancy
 
AMIS definer invoker rights
AMIS definer invoker rightsAMIS definer invoker rights
AMIS definer invoker rights
 
Identity & Access Management
Identity & Access ManagementIdentity & Access Management
Identity & Access Management
 
Kernel Recipes 2013 - Kernel for your device
Kernel Recipes 2013 - Kernel for your deviceKernel Recipes 2013 - Kernel for your device
Kernel Recipes 2013 - Kernel for your device
 
Kernel Recipes 2013 - Automating source code evolutions using Coccinelle
Kernel Recipes 2013 - Automating source code evolutions using CoccinelleKernel Recipes 2013 - Automating source code evolutions using Coccinelle
Kernel Recipes 2013 - Automating source code evolutions using Coccinelle
 
Distro Recipes 2013 : Debian and quality assurance
Distro Recipes 2013 : Debian and quality assuranceDistro Recipes 2013 : Debian and quality assurance
Distro Recipes 2013 : Debian and quality assurance
 
Distro Recipes 2013 : My ${favorite_linux_distro} is slow!
Distro Recipes 2013 : My ${favorite_linux_distro} is slow!Distro Recipes 2013 : My ${favorite_linux_distro} is slow!
Distro Recipes 2013 : My ${favorite_linux_distro} is slow!
 

Similar to Seminar Simplified Security

Presentatie hogescholen2017audit
Presentatie hogescholen2017auditPresentatie hogescholen2017audit
Presentatie hogescholen2017audit
drs Pieter de Kok RA
 
VU Information Risk Management Security Management 2010 JvdV
VU Information Risk Management  Security Management 2010 JvdVVU Information Risk Management  Security Management 2010 JvdV
VU Information Risk Management Security Management 2010 JvdVJurgen van der Vlugt
 
Noodzaak van een beveiligingsarchitectuur
Noodzaak van een beveiligingsarchitectuurNoodzaak van een beveiligingsarchitectuur
Noodzaak van een beveiligingsarchitectuur
Maikel Mardjan
 
Iot in de zorg the next step - fit for purpose
Iot in de zorg   the next step - fit for purpose Iot in de zorg   the next step - fit for purpose
Iot in de zorg the next step - fit for purpose
Getting value from IoT, Integration and Data Analytics
 
Webinar ISO 27001 informatiebeveiliging: revisie, certificering en implementa...
Webinar ISO 27001 informatiebeveiliging: revisie, certificering en implementa...Webinar ISO 27001 informatiebeveiliging: revisie, certificering en implementa...
Webinar ISO 27001 informatiebeveiliging: revisie, certificering en implementa...
Lloyd's Register Quality Assurance Nederland
 
Introductie boek Testing Cloud Services.
Introductie boek Testing Cloud Services.Introductie boek Testing Cloud Services.
Introductie boek Testing Cloud Services.
Kees Blokland
 
Savacco op bezoek
Savacco op bezoekSavacco op bezoek
Savacco op bezoek
CVO Hitek vzw (Kortrijk)
 
Fex 131104 - presentatie innervate - masterclass cloud ict flevum executive
Fex   131104 - presentatie innervate - masterclass cloud ict flevum executiveFex   131104 - presentatie innervate - masterclass cloud ict flevum executive
Fex 131104 - presentatie innervate - masterclass cloud ict flevum executive
Flevum
 
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitiefPrivacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Richard Claassens CIPPE
 
LRQA Congres 2014: Sessie ronde 1 15 mei 14:10 - 14:40 IT Security en Risk ma...
LRQA Congres 2014: Sessie ronde 1 15 mei 14:10 - 14:40 IT Security en Risk ma...LRQA Congres 2014: Sessie ronde 1 15 mei 14:10 - 14:40 IT Security en Risk ma...
LRQA Congres 2014: Sessie ronde 1 15 mei 14:10 - 14:40 IT Security en Risk ma...
Lloyd's Register Quality Assurance Nederland
 
Webinar - EAM /Reliability & Integrity Software selectie - 15 juli 2020
Webinar - EAM /Reliability & Integrity Software selectie - 15 juli 2020Webinar - EAM /Reliability & Integrity Software selectie - 15 juli 2020
Webinar - EAM /Reliability & Integrity Software selectie - 15 juli 2020
Stork
 
20130620 Streamlining Analytics extern
20130620 Streamlining Analytics extern20130620 Streamlining Analytics extern
20130620 Streamlining Analytics extern
Smals
 
De wereld van cybersecurity & ethisch hacken
De wereld van cybersecurity & ethisch hackenDe wereld van cybersecurity & ethisch hacken
De wereld van cybersecurity & ethisch hacken
Sijmen Ruwhof
 
Experience Story: Implementing Test automation in your organization
Experience Story: Implementing Test automation in your organizationExperience Story: Implementing Test automation in your organization
Experience Story: Implementing Test automation in your organization
Derk-Jan de Grood
 
Endpoint Security- Dwars doormidden - Thijs van Tilborg- NWD23
Endpoint Security- Dwars doormidden - Thijs van Tilborg- NWD23Endpoint Security- Dwars doormidden - Thijs van Tilborg- NWD23
Endpoint Security- Dwars doormidden - Thijs van Tilborg- NWD23
SURFevents
 
Nice to have, need to know computrain
Nice to have, need to know computrainNice to have, need to know computrain
Nice to have, need to know computrain
Computrain
 
ICTU at TOPdesk Café 31 01-2019
ICTU at TOPdesk Café 31 01-2019ICTU at TOPdesk Café 31 01-2019
ICTU at TOPdesk Café 31 01-2019
TOPdesk
 
171031 fex - op tijd compliant met gdpr - presentatie valid
171031   fex - op tijd compliant met gdpr - presentatie valid171031   fex - op tijd compliant met gdpr - presentatie valid
171031 fex - op tijd compliant met gdpr - presentatie valid
Flevum
 
Cyber Security - Wordt het veiliger of onveiliger?
Cyber Security - Wordt het veiliger of onveiliger? Cyber Security - Wordt het veiliger of onveiliger?
Cyber Security - Wordt het veiliger of onveiliger?
Sijmen Ruwhof
 

Similar to Seminar Simplified Security (20)

Presentatie hogescholen2017audit
Presentatie hogescholen2017auditPresentatie hogescholen2017audit
Presentatie hogescholen2017audit
 
VU Information Risk Management Security Management 2010 JvdV
VU Information Risk Management  Security Management 2010 JvdVVU Information Risk Management  Security Management 2010 JvdV
VU Information Risk Management Security Management 2010 JvdV
 
Noodzaak van een beveiligingsarchitectuur
Noodzaak van een beveiligingsarchitectuurNoodzaak van een beveiligingsarchitectuur
Noodzaak van een beveiligingsarchitectuur
 
Iot in de zorg the next step - fit for purpose
Iot in de zorg   the next step - fit for purpose Iot in de zorg   the next step - fit for purpose
Iot in de zorg the next step - fit for purpose
 
Webinar ISO 27001 informatiebeveiliging: revisie, certificering en implementa...
Webinar ISO 27001 informatiebeveiliging: revisie, certificering en implementa...Webinar ISO 27001 informatiebeveiliging: revisie, certificering en implementa...
Webinar ISO 27001 informatiebeveiliging: revisie, certificering en implementa...
 
Introductie boek Testing Cloud Services.
Introductie boek Testing Cloud Services.Introductie boek Testing Cloud Services.
Introductie boek Testing Cloud Services.
 
Savacco op bezoek
Savacco op bezoekSavacco op bezoek
Savacco op bezoek
 
Fex 131104 - presentatie innervate - masterclass cloud ict flevum executive
Fex   131104 - presentatie innervate - masterclass cloud ict flevum executiveFex   131104 - presentatie innervate - masterclass cloud ict flevum executive
Fex 131104 - presentatie innervate - masterclass cloud ict flevum executive
 
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitiefPrivacy het nieuwe groen | KNVI afdeling IT-audit | definitief
Privacy het nieuwe groen | KNVI afdeling IT-audit | definitief
 
LRQA Congres 2014: Sessie ronde 1 15 mei 14:10 - 14:40 IT Security en Risk ma...
LRQA Congres 2014: Sessie ronde 1 15 mei 14:10 - 14:40 IT Security en Risk ma...LRQA Congres 2014: Sessie ronde 1 15 mei 14:10 - 14:40 IT Security en Risk ma...
LRQA Congres 2014: Sessie ronde 1 15 mei 14:10 - 14:40 IT Security en Risk ma...
 
Webinar - EAM /Reliability & Integrity Software selectie - 15 juli 2020
Webinar - EAM /Reliability & Integrity Software selectie - 15 juli 2020Webinar - EAM /Reliability & Integrity Software selectie - 15 juli 2020
Webinar - EAM /Reliability & Integrity Software selectie - 15 juli 2020
 
20130620 Streamlining Analytics extern
20130620 Streamlining Analytics extern20130620 Streamlining Analytics extern
20130620 Streamlining Analytics extern
 
De wereld van cybersecurity & ethisch hacken
De wereld van cybersecurity & ethisch hackenDe wereld van cybersecurity & ethisch hacken
De wereld van cybersecurity & ethisch hacken
 
Experience Story: Implementing Test automation in your organization
Experience Story: Implementing Test automation in your organizationExperience Story: Implementing Test automation in your organization
Experience Story: Implementing Test automation in your organization
 
Endpoint Security- Dwars doormidden - Thijs van Tilborg- NWD23
Endpoint Security- Dwars doormidden - Thijs van Tilborg- NWD23Endpoint Security- Dwars doormidden - Thijs van Tilborg- NWD23
Endpoint Security- Dwars doormidden - Thijs van Tilborg- NWD23
 
Nice to have, need to know computrain
Nice to have, need to know computrainNice to have, need to know computrain
Nice to have, need to know computrain
 
ICTU at TOPdesk Café 31 01-2019
ICTU at TOPdesk Café 31 01-2019ICTU at TOPdesk Café 31 01-2019
ICTU at TOPdesk Café 31 01-2019
 
171031 fex - op tijd compliant met gdpr - presentatie valid
171031   fex - op tijd compliant met gdpr - presentatie valid171031   fex - op tijd compliant met gdpr - presentatie valid
171031 fex - op tijd compliant met gdpr - presentatie valid
 
Cyber Security - Wordt het veiliger of onveiliger?
Cyber Security - Wordt het veiliger of onveiliger? Cyber Security - Wordt het veiliger of onveiliger?
Cyber Security - Wordt het veiliger of onveiliger?
 
Portfolio ict portfolio 2012
Portfolio   ict portfolio 2012Portfolio   ict portfolio 2012
Portfolio ict portfolio 2012
 

More from Getting value from IoT, Integration and Data Analytics

AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
Getting value from IoT, Integration and Data Analytics
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...
Getting value from IoT, Integration and Data Analytics
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaS
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaSAMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaS
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaS
Getting value from IoT, Integration and Data Analytics
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Data
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: DataAMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Data
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Data
Getting value from IoT, Integration and Data Analytics
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
Getting value from IoT, Integration and Data Analytics
 
10 tips voor verbetering in je Linkedin profiel
10 tips voor verbetering in je Linkedin profiel10 tips voor verbetering in je Linkedin profiel
10 tips voor verbetering in je Linkedin profiel
Getting value from IoT, Integration and Data Analytics
 
Iot overview .. Best practices and lessons learned by Conclusion Conenct
Iot overview .. Best practices and lessons learned by Conclusion Conenct Iot overview .. Best practices and lessons learned by Conclusion Conenct
Iot overview .. Best practices and lessons learned by Conclusion Conenct
Getting value from IoT, Integration and Data Analytics
 
IoT Fit for purpose - how to be successful in IOT Conclusion Connect
IoT Fit for purpose - how to be successful in IOT Conclusion Connect IoT Fit for purpose - how to be successful in IOT Conclusion Connect
IoT Fit for purpose - how to be successful in IOT Conclusion Connect
Getting value from IoT, Integration and Data Analytics
 
Industry and IOT Overview of protocols and best practices Conclusion Connect
Industry and IOT Overview of protocols and best practices  Conclusion ConnectIndustry and IOT Overview of protocols and best practices  Conclusion Connect
Industry and IOT Overview of protocols and best practices Conclusion Connect
Getting value from IoT, Integration and Data Analytics
 
IoT practical case using the people counter sensing traffic density build usi...
IoT practical case using the people counter sensing traffic density build usi...IoT practical case using the people counter sensing traffic density build usi...
IoT practical case using the people counter sensing traffic density build usi...
Getting value from IoT, Integration and Data Analytics
 
R introduction decision_trees
R introduction decision_treesR introduction decision_trees
Introduction overviewmachinelearning sig Door Lucas Jellema
Introduction overviewmachinelearning sig Door Lucas JellemaIntroduction overviewmachinelearning sig Door Lucas Jellema
Introduction overviewmachinelearning sig Door Lucas Jellema
Getting value from IoT, Integration and Data Analytics
 
IoT and the Future of work
IoT and the Future of work IoT and the Future of work
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
Getting value from IoT, Integration and Data Analytics
 
Ethereum smart contracts - door Peter Reitsma
Ethereum smart contracts - door Peter ReitsmaEthereum smart contracts - door Peter Reitsma
Ethereum smart contracts - door Peter Reitsma
Getting value from IoT, Integration and Data Analytics
 
Blockchain - Techniek en usecases door Robert van Molken - AMIS - Conclusion
Blockchain - Techniek en usecases door Robert van Molken - AMIS - ConclusionBlockchain - Techniek en usecases door Robert van Molken - AMIS - Conclusion
Blockchain - Techniek en usecases door Robert van Molken - AMIS - Conclusion
Getting value from IoT, Integration and Data Analytics
 
kennissessie blockchain - Wat is Blockchain en smart contracts @Conclusion
kennissessie blockchain -  Wat is Blockchain en smart contracts @Conclusion kennissessie blockchain -  Wat is Blockchain en smart contracts @Conclusion
kennissessie blockchain - Wat is Blockchain en smart contracts @Conclusion
Getting value from IoT, Integration and Data Analytics
 
Internet of Things propositie - Enterprise IOT - AMIS - Conclusion
Internet of Things propositie - Enterprise IOT - AMIS - Conclusion Internet of Things propositie - Enterprise IOT - AMIS - Conclusion
Internet of Things propositie - Enterprise IOT - AMIS - Conclusion
Getting value from IoT, Integration and Data Analytics
 
Omc AMIS evenement 26012017 Dennis van Soest
Omc AMIS evenement 26012017 Dennis van SoestOmc AMIS evenement 26012017 Dennis van Soest
Omc AMIS evenement 26012017 Dennis van Soest
Getting value from IoT, Integration and Data Analytics
 
Oow2016 review-db-dev-bigdata-BI
Oow2016 review-db-dev-bigdata-BIOow2016 review-db-dev-bigdata-BI

More from Getting value from IoT, Integration and Data Analytics (20)

AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
AMIS Oracle OpenWorld en Code One Review 2018 - Blockchain, Integration, Serv...
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: Custom Application ...
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaS
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaSAMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaS
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 2: SaaS
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Data
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: DataAMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Data
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Data
 
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
AMIS Oracle OpenWorld en Code One Review 2018 - Pillar 1: Cloud Infrastructure
 
10 tips voor verbetering in je Linkedin profiel
10 tips voor verbetering in je Linkedin profiel10 tips voor verbetering in je Linkedin profiel
10 tips voor verbetering in je Linkedin profiel
 
Iot overview .. Best practices and lessons learned by Conclusion Conenct
Iot overview .. Best practices and lessons learned by Conclusion Conenct Iot overview .. Best practices and lessons learned by Conclusion Conenct
Iot overview .. Best practices and lessons learned by Conclusion Conenct
 
IoT Fit for purpose - how to be successful in IOT Conclusion Connect
IoT Fit for purpose - how to be successful in IOT Conclusion Connect IoT Fit for purpose - how to be successful in IOT Conclusion Connect
IoT Fit for purpose - how to be successful in IOT Conclusion Connect
 
Industry and IOT Overview of protocols and best practices Conclusion Connect
Industry and IOT Overview of protocols and best practices  Conclusion ConnectIndustry and IOT Overview of protocols and best practices  Conclusion Connect
Industry and IOT Overview of protocols and best practices Conclusion Connect
 
IoT practical case using the people counter sensing traffic density build usi...
IoT practical case using the people counter sensing traffic density build usi...IoT practical case using the people counter sensing traffic density build usi...
IoT practical case using the people counter sensing traffic density build usi...
 
R introduction decision_trees
R introduction decision_treesR introduction decision_trees
R introduction decision_trees
 
Introduction overviewmachinelearning sig Door Lucas Jellema
Introduction overviewmachinelearning sig Door Lucas JellemaIntroduction overviewmachinelearning sig Door Lucas Jellema
Introduction overviewmachinelearning sig Door Lucas Jellema
 
IoT and the Future of work
IoT and the Future of work IoT and the Future of work
IoT and the Future of work
 
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
Oracle OpenWorld 2017 Review (31st October 2017 - 250 slides)
 
Ethereum smart contracts - door Peter Reitsma
Ethereum smart contracts - door Peter ReitsmaEthereum smart contracts - door Peter Reitsma
Ethereum smart contracts - door Peter Reitsma
 
Blockchain - Techniek en usecases door Robert van Molken - AMIS - Conclusion
Blockchain - Techniek en usecases door Robert van Molken - AMIS - ConclusionBlockchain - Techniek en usecases door Robert van Molken - AMIS - Conclusion
Blockchain - Techniek en usecases door Robert van Molken - AMIS - Conclusion
 
kennissessie blockchain - Wat is Blockchain en smart contracts @Conclusion
kennissessie blockchain -  Wat is Blockchain en smart contracts @Conclusion kennissessie blockchain -  Wat is Blockchain en smart contracts @Conclusion
kennissessie blockchain - Wat is Blockchain en smart contracts @Conclusion
 
Internet of Things propositie - Enterprise IOT - AMIS - Conclusion
Internet of Things propositie - Enterprise IOT - AMIS - Conclusion Internet of Things propositie - Enterprise IOT - AMIS - Conclusion
Internet of Things propositie - Enterprise IOT - AMIS - Conclusion
 
Omc AMIS evenement 26012017 Dennis van Soest
Omc AMIS evenement 26012017 Dennis van SoestOmc AMIS evenement 26012017 Dennis van Soest
Omc AMIS evenement 26012017 Dennis van Soest
 
Oow2016 review-db-dev-bigdata-BI
Oow2016 review-db-dev-bigdata-BIOow2016 review-db-dev-bigdata-BI
Oow2016 review-db-dev-bigdata-BI
 

Seminar Simplified Security

Editor's Notes

  1. Twee resultaten om te onthouden na dit event: Security kan eenvoudig. Security is planbaar en prioriteerbaar.
  2. NIST.SP.800-53r4.pdf laten zien
  3. Data Protection voorbeeld noemen.
  4. Voorbeeld van Data Protection and Privacy gebruiken: Technology Enablers en bijbehorende Oracle products.