SlideShare a Scribd company logo
1 of 23
National
IS Strategy
2 May 2016
Sultan @Abukoshaim
CIO & Governor’s Advisor
SASO
Engineer Sultan AbuKoshaim is working now as CIO at the
Saudi Standards, Metrology and Quality Organization.
He has strong working experience in the field of Information
Systems that spans over 10 years, where he has taken on
positions ranging from telecom to banking to government
services. Most recently he worked as executive director of
information security and strategic planning at the Saudi food
and drug authority.
During his career Sultan was able to obtain a number of
certifications such as: ISO27001 Lead Auditor, CEH, SABSA SF,
SOC Supervisor, BPM Professional.
Sultan holds a B.Sc. in computer Engineering from Saudi
Arabia. He also holds an MBA from the Leicester university,
masters degree in Strategic Information Systems from Cardiff
University, and High Potential Leadership Program from
Harvard Business School.
@Abukoshaim
Abukoshaim
Abukoshaim@gmail.com
Abukoshaim
3 Questions
2 31
Do we have a NISS?
1
Do We have NISS?
1 National Policy for Science and Technology
2001 – 2020
10 Goals – 10 Strategies – 60 Policies
National IT Strategy
1426H - 7 Goals
Anti-Cyber Crime Law
3 pages
CERT
Incident Handling and Reporting
Council of Ministers Decision
1431 H
Draft: National Information Security Strategy
MCIT
Do we need NISS?
Why?
2
Before
1991
Hot Zones
2
After
1991
Hot Zones
2
2
IOT2
• 1 IDC; 2 MC/EDC: The Digital Universe of Opportunities; 3 Goldman Sachs; 4 IMS Research • Intel Security
2
Always increasing2
• Intel Security
How NISS should
look like?
3
3
FISMA3
Inventory Categorize Control
Risk
Assessment
Security Plan Certification
Monitoring
Government Branches3
Legislative Executive
Judicial
Kernel3
Why HowWhat
DIAGNOSIS ACTIONGOAL
“IS” Vs “National IS”3
C
A
I
“IS” Vs “National IS”3
C
A
I
Culture/
Social
Life/
Health
“You can avoid reality,
but you can’t avoid the
Consequences of reality”
Any Rand
1905- 1985
Sultan @Abukoshaim

More Related Content

Similar to Saudi Arabia National Information Security Strategy, current situation

Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costPECB
 
Splunk Forum Financial Services Chicago 9/13/17
Splunk Forum Financial Services Chicago 9/13/17Splunk Forum Financial Services Chicago 9/13/17
Splunk Forum Financial Services Chicago 9/13/17Splunk
 
Why IT does not matter in Exponential Organizations
Why IT does not matter in Exponential OrganizationsWhy IT does not matter in Exponential Organizations
Why IT does not matter in Exponential OrganizationsSrinivas Koushik
 
Magnus Management Group Capability Presentation 2020
Magnus Management Group  Capability Presentation 2020Magnus Management Group  Capability Presentation 2020
Magnus Management Group Capability Presentation 2020NXTKey Corporation
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityElasticsearch
 
Bright sparks in finance and how to position for it
Bright sparks in finance and how to position for itBright sparks in finance and how to position for it
Bright sparks in finance and how to position for itANG Kar Wee
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan MMohan M
 
Mohamed e al bakry cv 20 04 2015
Mohamed e al bakry cv 20 04 2015Mohamed e al bakry cv 20 04 2015
Mohamed e al bakry cv 20 04 2015Mohamed Bakry
 
Sys value corporate presentation - security audits 2013
Sys value   corporate presentation - security audits 2013Sys value   corporate presentation - security audits 2013
Sys value corporate presentation - security audits 2013Filipe Rolo
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfinsightssuccess2
 
The-Network-Javed_joa_Eng_0516
The-Network-Javed_joa_Eng_0516The-Network-Javed_joa_Eng_0516
The-Network-Javed_joa_Eng_0516Euro-cloud Euro
 
Resume - sovan adhikary
Resume - sovan adhikary Resume - sovan adhikary
Resume - sovan adhikary Sovan Ay
 
Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISAIshita Kundu
 

Similar to Saudi Arabia National Information Security Strategy, current situation (20)

Skillmine CISO as service
Skillmine CISO as serviceSkillmine CISO as service
Skillmine CISO as service
 
Business Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and costBusiness Continuity requires a Security Architecture to reduce risk and cost
Business Continuity requires a Security Architecture to reduce risk and cost
 
Splunk Forum Financial Services Chicago 9/13/17
Splunk Forum Financial Services Chicago 9/13/17Splunk Forum Financial Services Chicago 9/13/17
Splunk Forum Financial Services Chicago 9/13/17
 
CIPS-SK-Annual-Report-201-15-Sept-2015
CIPS-SK-Annual-Report-201-15-Sept-2015CIPS-SK-Annual-Report-201-15-Sept-2015
CIPS-SK-Annual-Report-201-15-Sept-2015
 
Why IT does not matter in Exponential Organizations
Why IT does not matter in Exponential OrganizationsWhy IT does not matter in Exponential Organizations
Why IT does not matter in Exponential Organizations
 
Magnus Management Group Capability Presentation 2020
Magnus Management Group  Capability Presentation 2020Magnus Management Group  Capability Presentation 2020
Magnus Management Group Capability Presentation 2020
 
Innovating at speed and scale with implicit security
Innovating at speed and scale with implicit securityInnovating at speed and scale with implicit security
Innovating at speed and scale with implicit security
 
Bright sparks in finance and how to position for it
Bright sparks in finance and how to position for itBright sparks in finance and how to position for it
Bright sparks in finance and how to position for it
 
CV of Mohan M
CV of Mohan MCV of Mohan M
CV of Mohan M
 
Mohamed e al bakry cv 20 04 2015
Mohamed e al bakry cv 20 04 2015Mohamed e al bakry cv 20 04 2015
Mohamed e al bakry cv 20 04 2015
 
AAS Cybersecurity 2 pages
AAS Cybersecurity 2 pagesAAS Cybersecurity 2 pages
AAS Cybersecurity 2 pages
 
KhaledCV 1.11
KhaledCV 1.11KhaledCV 1.11
KhaledCV 1.11
 
Hema Resume
Hema  ResumeHema  Resume
Hema Resume
 
Sys value corporate presentation - security audits 2013
Sys value   corporate presentation - security audits 2013Sys value   corporate presentation - security audits 2013
Sys value corporate presentation - security audits 2013
 
Raymond Perez-Information-Security-CISO-Resume3-2016
Raymond Perez-Information-Security-CISO-Resume3-2016Raymond Perez-Information-Security-CISO-Resume3-2016
Raymond Perez-Information-Security-CISO-Resume3-2016
 
India's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdfIndia's Leading Cyber Security Company2022.pdf
India's Leading Cyber Security Company2022.pdf
 
William mc giverin2
William mc giverin2William mc giverin2
William mc giverin2
 
The-Network-Javed_joa_Eng_0516
The-Network-Javed_joa_Eng_0516The-Network-Javed_joa_Eng_0516
The-Network-Javed_joa_Eng_0516
 
Resume - sovan adhikary
Resume - sovan adhikary Resume - sovan adhikary
Resume - sovan adhikary
 
Resume_IshitaKundu_CISA
Resume_IshitaKundu_CISAResume_IshitaKundu_CISA
Resume_IshitaKundu_CISA
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Saudi Arabia National Information Security Strategy, current situation

Editor's Notes

  1. I’ve been in the field of IT and information security for about 14 years. So this topic has been smowehat close to me for a while as you might imagine. Although I have to admit that only a few years ago that I started looking at it from a new angle with a forward looking view to the future. From that point on the subject had became part of my daily thoughts and routines and I started realizing the extent and magnitude of where we needed to mitigate risk and have good controls in our Technology enabled future. And of course the answer was always: we needed it everywhere! And let me try to explain what I mean when I say “everywhere"… last week I got a call to participate in this conference and share my experience in IT security strategies. So I got down to it and started putting the slides together on my laptop relying a lot on my own experiences and some gained thoughts and knowledge over the years. As I was writing along, my son Abdulkarim (who’s 6 years old), walked into the room, stood by me and asked what I was doing. I explained that I was getting ready to meet some people and share some thoughts on something called the national information security strategy. He asked what that meant? I stopped typing, and said: Well, it means that in the future, everything will change.   Each one of your toys will have a name and an identity.   Our refrigerator will tell us when it feels hungry to be stocked with the needed food!.   Our car will take us to our friends without the need of a driver!   it will also mean that your bed will miss you and call you to come if you stayed awake beyond your regular bedtime.  And when you come to sleep, your comfy bed will tell your favorite bedtime stories! When that time comes, we need to be sure that things don’t go crazy.   We need to make sure that your pretty toys will not spy on us.   We need to make sure that our refrigerator will not lie about being hungry!   That our car will not take us to wrong or dangerouse places instead of our friends house.   We also need to make sure that your comfy bed will choose for you a good bedtime story, not a scary one! I stopped and looked at him waiting to see if he was following me… then he said: Can you sleep with me, I can’t trust my bed anymore? Good enough.. let’s go! :) dad can you read me a bedtime story
  2. In jun 2013, Edward Snowden, a former Boz Allen Hamilton employee, revealed thousands of classified documents to the news. He revealed documents about PRIMS. PRISM is a clandestine[1] surveillance program under which the United States National Security Agency (NSA) collects internet communications from at least nine major US internet companies. and escaped from US to Russia after he 100 of thousand of documents that shows how the US government works with most major IT companies and service providers to spy on internet traffic. The spying surveillance program is called PRISM. They Angela Merkel> Government Chancellor. PRISM start in 2007 under Bosh administration. In 2013: The guardian + Washington post Compnaies: Yahoo, google, apple, MS, Skype, aol, Facebook, YouTube, NOT twitter. Edward work: CIA, DELL, BOZ allen > NSA
  3. نظام مكافحة الجرائم المعلوماتية، تترواح العقوبة بين 500 الف إلى 5 مليون National IT strategy (7 Objectives under long term vision) It has 5 years plan that has: 26 goals, 62 polices, and 98 projects Non of these state the need to build OS or HW or Network components تقييم الوضع عدم وجود سياسات ومعايير مشرتكة لادارة امن المعلومات تقوم كل منشاء بتطبيق معاييرها الخاصة في ادارة امن المعلومات، مع عدم وجود طريقة مشتركة بين تلك الجهات. يسر تكتفي حاليا بالربط مع الجهات وبدات في دورتها الاخيرة بوضع معايير لامن المعلومات. لا تخضع عملية تقييم امن المعلومات وادارة المخاطر لاطار عملي مشترك بين الجهات. يوجد نقص واضح في تأهيل واعداد المتخصصين في امن المعلومات. لايوجد اي معلومات عن انظمة SCADA ومستوى امن المعلومات لديها. ماذا عن خطط احتواء الكوارث، موجودة في بعض الجهات وليس جميعها.
  4. Preparing for a future where everything is connected to the Web  It’s no secret that the Internet of Things is exploding: Already, things like medical devices, cars, and electric meters connect to the Web. Google's Parent Company Alphabet Wants to Build a New City From the Ground Up New York. Portland. San Francisco. Seattle. The debate rages on about the mostinnovative city in America. But if Google parent company Alphabet has its way, there soon may be a new contender. Sidewalk Labs, which Google created last June and has since spun off as a subsidiary--is reportedly scouting locations to build an entire city, a highly connected utopia that will make the aforementioned cities look obsolete. Think: self-driving cars, high-speed Wi-Fi, internet of things-enabled everything. According to The Information, the Denver and Detroit areas, so far, look like the frontrunners. Sidewalk Labs has consulted with more than 100 urban planning experts and forward thinkers, such as Anthony Townsend, research director of Institute for the Future. Sidewalk Labs already has some heavy-hitting city planners in its own ranks, including its CEO, Dan Doctoroff, a former New York City deputy mayor.
  5. We stated to be connected pace by pace. We are taken by storm to this IOT Gartner Says 6.4 Billion Connected "Things" Will Be in Use in 2016, Up 30 Percent From 2015 Analysts to Explore the Value and Impact of IoT on Business at Gartner Symposium/ITxpo 2015, November 8-12 in Barcelona, Spain Gartner, Inc. forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 20.8 billion by 2020. In 2016, 5.5 million new things will get connected every day.
  6. In 2014 2 white hat hackers trier to hack into a Jeep. And they successfully managed to access it remotely and take over the almost everything in the care. The driving wheel. The accelartor. The breaks. The airconditiosn. and The music player. They stopped the engine of the care where the victim where in the care in middle of the highway. https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
  7. Hacktivism, Hacktivist
  8. Ransomware is Becoming a big thing nowdays. 2 million samples. The total number of ransomware sampels in the McAfee labs zoo surpassed 2 million in 2014 Clould based storage. Ransomware will target endpoint that subscribe to cloud based storage services. Attempting to use the stored credintials. $255k stolen. This is the only observed. Mobile Space. it attacks even mobiles
  9. Cyber Security Strategy Documents https://ccdcoe.org/strategies-policies.html
  10. FISMA federal IS management Act FISMA assigns responsibilities to various agencies to ensure the security of data in the federal government. The act requires program officials, and the head of each agency, to conduct annual reviews of information security programs, with the intent of keeping risks at or below specified acceptable levels in a cost-effective, timely and efficient manner. The National Institute of Standards and Technology ( NIST ) outlines nine steps toward compliance with FISMA: Categorize the information to be protected. Select minimum baseline controls. Refine controls using a risk assessment procedure. Document the controls in the system security plan. Implement security controls in appropriate information systems. Assess the effectiveness of the security controls once they have been implemented. Determine agency-level risk to the mission or business case. Authorize the information system for processing. Monitor the security controls on a continuous basis. It is essential that agency officials have the most complete, accurate, and trustworthy information possible on the security status of their information systems in order to make timely, credible, risk-based decisions on whether to authorize operation of those systems. FISMA as a well-intentioned but fundamentally flawed tool, and argued that the compliance and reporting methodology mandated by FISMA measures security planning rather than measuring information security. and if security people view FISMA as just a checklist, nothing is going to get done.
  11. NOW. This is a classical process of developing strategies. It is very crucial for us to focus on these high level process before getting anywhere with the details.
  12. There is a difference in kind not a different in degree when we compare ISS Vs. NISS While the classical exercise of IS start with identifitying assets in had to be protected. NISS looks into futuristic assets; which we are expecting to have and connect in the futre.
  13. There is a difference in kind not a different in degree when we compare ISS Vs. NISS While the classical exercise of IS start with identifitying assets in had to be protected. NISS looks into futuristic assets; which we are expecting to have and connect in the futre.