Uncategorized
Fergal O`Byrne joins IIA Board
Fergal O`Byrne joins IIA Board
Fergal O`Byrne has been co-opted as a director to the board of the IIA. He has also been appointed Chairman of the South East Region for the IIA to further the IIA`s commitment to develop regional events and activities. He will also take on the responsibility of Chairman of the Online Marketing working group.
Biography
Fergal O`Byrne is an internet consultant specializing in the area of online marketing. He originally founded Interactive Return (formerly webBusters) back in 1998 and successfully sold his holding in the company in 2005. He is on the Board of Directors of premier gift company 4giftsdirect.com and Contact Centre Development (www.ccd.ie). He is also an Associate Lecturer on the MBA course at the Smurfit School of Business.
Fergal is a member of the Irish Internet Association and a number of other international professional bodies. He has written many white papers and technical documents for technical and marketing magazines and was the internet industry commentator for Business and Finance magazine. He was chosen as the first Irish person to address the New York New Media Association. He won the Irish Internet Association`s Net Visionary Award for internet marketing in 2004.
His most recent book – 10 Online Marketing and Search Engine Essentials was published in August 2004 by Aspatore Books. Fergal`s other books include – 10 Technologies Every executive should know – written with Dermot Mc Cormack, and also published by Aspatore Books.
He was part of the original team that helped to set up eircom.net and was Content Development Manager in charge of such projects as the Doras Directory, Ireland`s largest directory of rated websites. He also worked as Product Development Manager for PhoneWatch, helping to develop their wireless intruder alarm system. Fergal has represented Ireland on a number of European Technical Working Groups, including WG11 of TC79. He holds an Honours Degree in Electronic Engineering from DIT, Kevin Street.
He has also written fiction works for radio, stage and film and was Short Listed for the 2000 Hennessy Literary Awards. His most recent book Trolley Ride in Manhattan was published by Mentor Books.
Uncategorized
Call for new IIA Directors
Call for new directors for IIA Board
The IIA AGM will be held shortly to approve the 2004 accounts and appoint three new directors.
If any IIA member is interested in joining the board of the IIA please email: mailto:irene@iia.ie or call 01-4535707 for further information.
Uncategorized
Call for Nominations – 2005 Net Visionary Awards
The IIA are calling for nominations for the 2005 Net Visionary Awards. The nomination process is open until 5pm on the 1st of September 2005. Do any of your colleagues, clients or suppliers deserve recognition for their contribution to the Internet in Ireland? Nominate them for the 2005 Net Visionary Awards. There is no cost associated with nominating people for these awards.
The nominations will then progress to an open online voting process which will generate a shortlist for each award. The winners of each category will be announced at a Gala Black Tie Awards Ceremony on the 17th of November in Clontarf Castle, in Dublin.
There are twelve categories that you may nominate under:
Social Contribution, Educational Contribution, Technology Journalist, Internet Marketer, Web Designer Excellence, Web Developer Excellence, Online Trader, Mobile Internet Contribution, Innovation, eGovernment and Internet Entrepreneur.
Details of Award Categories: http://www.netvisionary.ie/awards.html
Nominate now: http://www.netvisionary.ie/votenom.html
Ensure you read the rules before submitting your nomination.
Category winners receive a framed net visionary category winner certificate and crystal along with a profile in the 2006 Netgain magazine.
The overall Net Visionary award winner is selected through an internal IIA board member nomination process. The winner of the overall Net Visionary award will receive a framed certificate, crystal, and membership and profile through the IIA web site and Netgain magazine.
History of Net Visionary Awards: http://www.netvisionary.ie/history.html
You do not have to be a member of the IIA to take part in the nomination or voting process. More information on the IIA can be found at: http://www.iia.ie/
This year over 400 people will attend the Black tie event in the Clontarf Castle. Over 200 of these seats have already been booked. If you wish to attend this event please book or provisionally reserve your seats at http://www.iia.ie/events.asp?eventid=60
The Clontarf Castle has been block booked by the IIA for this event. There is a special rate of 100 EURO single, 125 EURO double with bed and breakfast. If you wish to have rooms reserved, it is advised to book before the 1st of September. Last year rooms booked out within 14 days. Contact the IIA office on 01-453 5707 for more information. http://www.clontarfcastle.ie
2005 Sponsors
The IIA would like to thank all its sponsors who make this event possible.
AIB, IEDR, Brightwater Recruitment, Blacknight, Realex Payments, Euroconex, Zerephina, Netsource, and MRPA Kinman and Hosting365. Headline sponsor to be announced shortly.
Over the last seven years the Net Visionary Awards have become the most respected Internet awards, honoring individuals for their contribution to the Irish Internet Industry. Nominated by colleagues, clients and peers; voted on by industry professionals these awards are truly the most prestigious awards on the Industry calendar.
Last year over 70 individuals were nominated for awards and over 45,000 votes were cast online to select the final winners. Over 350 industry professionals joined with VIP guests at a Black Tie Gala dinner in Clontarf Castle in 2004. The winner of the overall Net Visionary Award was Tom Kelly, Managing Director of Netsource. Details of all previous years winners at www.netvisionary.ie
2004 Category winners:
Social Contribution – Tom Murphy, Boards.ie, Innovation – Martin McKay, Texthelp, Technology Journalist – Jamie Smyth, Irish Times, E-government – Frank Daly, Revenue, Internet Marketing – Fergal O`Byrne, Fergalobyrne.com, Web Designer Excellence – Fergal Lawler, Strata3, Web Developer Excellence – Kiran Shah, Irishjobs.ie, Online Trader – Brendan Rice, Aer Lingus
New Entrepreneur – Aodhan Cullen, Statcounter.com, Education Contribution – Seaghan Moriarty, Digilogue
Mobile Internet Contribution – Donal McGuinness, Its Mobile.
Net Visionary Award Winners:
(1999) Liam Ferrie – Irish Emigrant
(2000) Barry McDonagh – Concern/The Good Spider
(2001) Deirdre Veldon – Ireland.com
(2002) Denise Cox – E-search/Irishanimals.com
(2003) Cormac Callanan – Hotline.ie
(2004) Tom Kelly – Netsource
Uncategorized
Technical Links
Good starting point for any research on security issues:
http://searchsecurity.techtarget.com
The supporting “magazine” site for above.
http://informationsecurity.techtarget.com/
Good Intro to Information Security – Good list of links at the bottom of article
http://secinf.net/policy_and_standards/An_Overview_of_Corporate_Information_Security_.html
Counterpane – Bruce Schneier’s Cryptogram
www.schneier.com/crypto-gram.html
Information on spyware and trojans
www.trendmicro.com/en/home/global/enterprise.htm
http://securityresponse.symantec.com/
www.cert.org/
www.cert.org/tech_tips/home_networks.html – home tips, very complete
Information on hacker activity – The Internet Storm Center
http://isc.sans.org/
www.cert.org/
Information on vulnerabilities
This is a useful site for finding vulnerabilities in operating systems and other software. http://secunia.com
Known exploits
www.k-otik.com/exploits/ –
Cryptography
http://eprint.iacr.org/
www.cacr.math.uwaterloo.ca/ – Cryptography Centre
www.cacr.math.uwaterloo.ca/hac/ (The Handbook of Applied Cryptography)
www.rsasecurity.com/rsalabs/node.asp?id=2149
Spyware
http://ww2.websense.com/docs/WhitePapers/Spywareyouprobablyhaveit.pdf
Instant Messaging Threats
http://ww2.websense.com/docs/WhitePapers/InstantMessagingAnInstantThreat.pdf
Encryption
Encryption for the layman
www.viacorp.com/crypto.html
Quite technical stuff
www.securityfocus.com/ -complete and quite technical
Irish Security Organisations
IISF Irish Information Security Forum www.iisf.ie/
ISSA the Irish Chapter of the Information Systems Security Association
www.issaireland.org/
Uncategorized
General eBusiness – How to Guides
How To Guides – Beginner
The Basics of Information Technology (in-depth)
Developing your first website (in-depth)
eBusiness and Legal Considerations
eCRM
eSecurity
eCRM
eWork Guide (in-depth)
Formulating an IT/eBusiness strategy
Electronic Forms for IT strategy formulation (MS Excel Format)
Managing an eBusiness Project (in-depth)
Using a Consultant to prepare an IT and eBusiness improvement plan.
Promoting your Online Presence
The Internet as a Business Intelligence Tool (in-depth)
Advanced
Choosing an ISP and a Telecommunication Method(in-depth)
Choosing eBusiness vendors and software/a>
eBusiness and Legal Considerations
eBusiness Taxation
eProcurement
eSecurity
Using a Consultant to prepare an IT and eBusiness Improvement Plan.
Formulating an IT/eBusiness strategy
Internal IT Security Policy and Procedures
Managing an eBusiness Project
Systems Integration
Website Privacy Policy
Uncategorized
IIA Security Working Group
Group Chairman – Conall Lavery, Chief Executive, Entropy
Group members
Richard Nealon, Operational Risk & Compliance Manager, Payments and Electronic Services, Bank of Ireland Group
Sean Reynolds, Chief Executive Officer, Rits.
Claire Whelan, PhD, DCU
John Brosnan, Chief Executive Officer, Netfort Technologies
Michael Brophy, Chief Executive Officer, Certification Europe
Conor Crowley, Programme Manager, HP Imaging and Printing Group
Brian O’Doherty, Herbert St Technologies
Uncategorized
Security Definitions Guide
Acceptable Encryption Policy – Defines requirements for encryption algorithms used within the organization`.
Acceptable Use Policy – Defines acceptable use of equipment and computing services, and the appropriate employee security measures to protect the organization’s corporate resources and proprietary information.
Analog/ISDN Line Policy – Defines standards for use of analog/ISDN lines for Fax sending and receiving, and for connection to computers.
Anti-Virus Process – Defines guidelines for effectively reducing the threat of computer viruses on the organization’s network.
Application Service Provider Policy – Defines minimum security criteria that an ASP must execute in order to be considered for use on a project by the organization.
Application Service Provider Standards -Outlines the minimum security standards for the ASP. This policy is referenced in the ASP Policy above.
Acquisition Assessment Policy -Defines responsibilities regarding corporate acquisitions, and defines the minimum requirements of an acquisition assessment to be completed by the information security group.
Audit Vulnerability Scanning Policy – Defines the requirements and provides the authority for the information security team to conduct audits and risk assessments to ensure integrity of information/resources, to investigate incidents, to ensure conformance to security policies, or to monitor user/system activity where appropriate.
Automatically Forwarded Email Policy – Documents the requirement that no email will be automatically forwarded to an external destination without prior approval from the appropriate manager or director.
Database Credentials Coding Policy – Defines requirements for securely storing and retrieving database usernames and passwords.
Dial-in Access Policy – Defines appropriate dial-in access and its use by authorized personnel.
DMZ Lab Security Policy – Defines standards for all networks and equipment deployed in labs located in the “Demilitarized Zone” or external network segments.
E-mail Policy – Defines standards to prevent tarnishing the public image of the organization.
E-mail Retention (US Centric) – The Email Retention Policy is intended to help employees determine what information sent or received by email should be retained and for how long.
Ethics Policy – Defines the means to establish a culture of openness, trust and integrity in business practices.
Extranet Policy -Defines the requirement that third party organizations requiring access to the organization’s networks must sign a third-party connection agreement.
Information Sensitivity Policy -Defines the requirements for classifying and securing the organization’s information in a manner appropriate to its sensitivity level.
Internal Lab Security Policy – Defines requirements for internal labs to ensure that confidential information and technologies are not compromised, and that production services and interests of the organization are protected from lab activities.
Internet DMZ Equipment Policy – Defines the standards to be met by all equipment owned and/or operated by the organization that is located outside the organization’s Internet firewalls (the demilitarized zone or DMZ)).
Lab Anti-Virus Policy – Defines requirements which must be met by all computers connected to the organization’s lab networks to ensure effective virus detection and prevention.
Password Protection Policy – Defines standards for creating, protecting, and changing strong passwords.
Remote Access Policy – Defines standards for connecting to the organization’s network from any host or network external to the organization.
Risk Assessment Policy – Defines the requirements and provides the authority for the information security team to identify, assess, and remediate risks to the organization’s information infrastructure associated with conducting business.
Router Security Policy – Defines standards for minimal security configuration for routers and switches inside a production network, or used in a production capacity.
Server Security Policy – Defines standards for minimal security configuration for servers inside the organization’s production network, or used in a production capacity.
The Third Party Network Connection Agreement – Defines the standards and requirements, including legal requirements, needed in order to interconnect a third party organization’s network to the production network. This agreement must be signed by both parties.
VPN Security Policy – Defines the requirements for Remote Access IPSec or L2TP Virtual Private Network (VPN) connections to the organization’s network.
Wireless Communication Policy – Defines standards for wireless systems used to connect to the organization’s networks.
www.sans.org/resources/policies/ – very complete template policies