CYBERSECURITY POLICY MAKING AT A TURNING POINT

This report analyses the latest generation of “national cybersecurity strategies” in ten volunteer countries and identifies commonalities and differences. The volunteer countries responded to a questionnaire and provided relevant material, between February 2011 and May 2012. Representatives of business, civil society and the Internet technical community participated actively in the work, in particular by responding to a questionnaire. The full text of their contribution is available in a separate document (OECD, 2012b).
The report was discussed by the Working Party on Information Security and Privacy (WPISP) and declassified by the Committee for Information, Computer and Communications Policy (ICCP) at its 64th session on 24 October 2012. The findings of the work will inform the upcoming review of the OECD 2002 Guidelines for the Security of Information Systems and Networks: Towards a Culture of Security.

Spotlight

Innovative Solutions SA

Innovative Solutions (IS) is a specialized professional services company delivering topnotch Information Security and Products development for Saudi Arabia and the Gulf region. We offer Products development including SMS gateway, OTP, and Security Awareness. Our Cyber Security Services includes ISO 27001 implementations, penetration testing, source code reviews, vulnerability and risk assessment & management. We specialize in providing information security solutions including SOC implementations, WAF, firewalls, IDS/IPS, and more.. Innovative Solutions is a winner of CITC Tahfeez program, SAGIA 100 Fast Growth companies and an ISO 27001 certified company, Winner of MRM Business Award 2014 in the services category, and won F5 best partner award.

OTHER WHITEPAPERS
news image

Privileged Remote Access Security in Cloud Whitepaper

whitePaper | May 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to your organization. BeyondTrust can help your organization stay secure and compliant, while improving the efficiency and success of your organization with a better user experience.

Read More
news image

White Paper on Cyber Security Securing Video Surveillance Devices to Close Network Vulnerabilities

whitePaper | February 19, 2020

We live in an increasingly connected world, where more and more devices and systems are networked and shared with other systems. Convenience is a main driver behind this trend, as people have come to expect the ability to connect to and control devices and systems anywhere, anytime. However, there is a downside to the unprecedented level of convenience provided by the growing number of networked devices, namely increased security risk. Because each device is an endpoint for networks, they introduce the potential to become entry points for hackers and others with malicious intents. In fact, in many of the most high-profile data breaches that have occurred recently, hackers were able to access corporate networks through POS, HVAC and other networked systems that failed to provide an adequate level of security to prevent these types of breaches.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Cyber Security After the Pandemic

whitePaper | April 29, 2021

The cyber security industry has faced two major sets of challenges over the last twelve months. The attacks and exploits affecting Solar Winds, Accellion, Microsoft and their customers have focused attention on supply chain risk, but the impact of the coronavirus pandemic has been felt more broadly across cyber security domains and disciplines.

Read More
news image

ZTE Cybersecurity White Paper 2021

whitePaper | October 29, 2021

Telecommunications equipment and systems, as critical infrastructure for a nation, have been widely valued by governments, operators, and users worldwide. Currently, the deployment of 5G has begun. Featuring faster speed, greater network capacity, and ultra-low latency, 5G will redefine the operation of critical infrastructure from the factory floor to the cloud. Its new technologies including Software-Defined Networking (SDN), Network Function Virtualization (NFV), Multi-access Edge Computing (MEC), and network slicing are paving the way for smart cities, remote surgery, autonomous vehicles, and large-scale Internet of Things (IoT) connectivity.

Read More
news image

Guide to Cloud Security Posture Management Tools

whitePaper | June 16, 2023

Good cloud security hygiene starts with complete visibility into the security and compliance posture of every resource you deploy into your cloud. It’s one thing to achieve this visibility in a single cloud environment—you can lean heavily on the native monitoring and auditing tools of your cloud provider, using third-party solutions to fill in gaps (e.g., threat detection)—but in a multi-cloud architecture, maintaining robust cloud security posture becomes exponentially more complex. It is much more difficult to achieve centralized visibility as well as consistently enforce policies and compliance rules within a multi-cloud environment. It’s also more complicated to detect threats and fix vulnerabilities quickly due to the sheer complexity of threats across distributed, multilayered architectures. You can address these challenges, though—and you need to, if you want to take advantage of multi-cloud architecture without compromising on security.

Read More

Spotlight

Innovative Solutions SA

Innovative Solutions (IS) is a specialized professional services company delivering topnotch Information Security and Products development for Saudi Arabia and the Gulf region. We offer Products development including SMS gateway, OTP, and Security Awareness. Our Cyber Security Services includes ISO 27001 implementations, penetration testing, source code reviews, vulnerability and risk assessment & management. We specialize in providing information security solutions including SOC implementations, WAF, firewalls, IDS/IPS, and more.. Innovative Solutions is a winner of CITC Tahfeez program, SAGIA 100 Fast Growth companies and an ISO 27001 certified company, Winner of MRM Business Award 2014 in the services category, and won F5 best partner award.

Events