Audits strengthen business operations, yet many organizations are fearful of the process, rather than seeing the benefits of audits. In this webinar, you get better insights in the auditing process and how you can use audits to strenghten and mature your overall risk programme.
Operationalizing NIS in digital infrastructures: a testimonial from DNS Belgium – Webinar 11 June 2020
11 June 2020 – Cyber Security Coalition
A new series of webinars by the NIS Focus Group, chaired by Kurt Callewaert (HOWEST), zooms in on ‘digital service providers’ and related digital infrastructures. A most interesting kick-off was the testimonial on NIS implementation by Kristof Tuyteleers, security officer at DNS Belgium – a most critical infrastructure provider if there ever was one, as top level domain registry for .be, .brussels and .vlaanderen. A small organization – 35 people – they are challenged to cope with requirements from two complementary pieces of European legislation: the NIS Directive (concerning critical infrastructure, rather reactive by nature) and the European Cybersecurity Act (e.g. security by design, rather proactive). This means an effective integration of standards (e.g. 27K family) with technical standards and best practices, while translating all of this in everyday real life security measures. Including the need for relevant audits and monitoring.
The presentation provides a concise and clear overview of this sector of the Internet ecology, indicating the role and position of an organization as DNS Belgium. Kristof Tuyteleers provided quite some insights into how his organization tackles its challenges, internally and as a member of a collaborative European centre (with Tuyteleers chairing its Security working group). He stresses the use of a statement of applicability to map standards on needs, and points out the need for ways to monitor the effectiveness of it all (by combining audit results, KPIs, statistics, etc.). However, “I’m still missing some real security testing!” Also, some more sector specific guidance would be welcome, including clear ‘do’s’ and don’ts’. With European colleagues, he authored a very helpful ‘security maturity model’ to evaluate the security posture of an organization. But also, he emphasized that “we need the cooperation of all of you” to implement secure services, as e.g. DNSSEC!
Other blog posts
This webinar focuses on the context of information security through governance, more particularly on the key role of the CISO and the value of COBIT as a digital governance framework for information security activities supported by the presentation of a best practice.
This webinar presents the building blocks of an effective organization-wide risk management and explains the requirements for IT risk management certification.
In this Cyber Talk you gain insights in advanced threats outside your organisation and what you could potentially do to protect you from them.
In this first webinar of the GRC: Be Connected! series, some very basic aspects of cyber security are treated: how to manage necessary skills, what about frameworks, where to find knowledge.