10 documents found
Refinement
-
2019 Cyber security where to start. And what else is there to do.Information Security
The members of the CEG Information Security have combined their knowledge in this publication. This publication serves as an inspiration document for organizations that have less capacity to think about cybersecurity, but would like to get started with it. The publication summarizes the learnings from the daily practice of our members around security measures in a simple way. Suitable for anyone who thinks 'maybe I should also do something about cybersecurity, but where do I start?'.
25-09-2019 -
2019 CSR Magazine 19: 'Put people at the center of the digital age'
The importance of the human factor for an open, secure and prosperous digital Netherlands • High-level government officials and business leaders speaking about the importance of the human factor in relation to cyber security in the Netherlands, across Europe and worldwide. https://www.cybersecurityraad.nl
17-10-2019 -
2016 Essential conditions for the safe use of cloud services - update December 2016Information Security, Digital Strategy
Publication contains a ‘Checklist’ of conditions which can be connected to laws and regulations and/or convential standards. Within the CEG Information Security a check has been done on the Cloud Checklist version January 2015. Changes have been made about Safe Harbour and also new ISO Certifications are listed.
09-01-2017 -
2016 Data Classification Guide CIO Platform NederlandInformation Security, Digital Strategy
This document contains a description of good practice for (data) classification. Data corresponds in this context to all data and information, regardless of the medium in which it is stored and regardless of its presentation. This document is especially important for system owners, information managers and (corporate) information security officers.
23-12-2016 -
2016 Coordinated Vulnerability Disclosure 1.5. Model policy and procedureInformation Security
Publication contains an example policy and procedure.
28-09-2016 -
2016 Coordinated Vulnerability Disclosure 1.4. Implementation GuideInformation Security
The implementation guide is an aid for achieving proper interpretation of the Coordinated Vulnerability Disclosure policy.
06-07-2016 -
2016 Coordinated Vulnerability Disclosure 1.3. Q and AInformation Security
Twopager with more information about the 'Coordinated Vulnerability Disclosure Manifesto'
06-07-2016 -
2016 Coordinated Vulnerability Disclosure 1.2. ManifestoInformation Security
With this manifesto the signing parties try to raise awareness for the importance of cooperation between organizations and the ICT community to find and solve ICT-vulnerabilities.
06-07-2016 -
2016 Coordinated Vulnerability Disclosure 1.1. IntroductionInformation Security
Onepager which explaines the origination of the ‘Coordinated VulnerabilityDisclosure Manifesto’
06-07-2016 -
2016 Code of Conduct for an equal relationshipVendor Relations
This Code of Conduct aims to achieve an agreed set of principles towards a more equal and reciprocal relationship between (potential) client and (potentiel) supplier. This document is also available in Dutch "Gedragscode voor een evenwichtige relatie".
07-12-2016