WISER Cyber Risk Monitoring Services Sample Clauses

WISER Cyber Risk Monitoring Services. The extended suite of tools and services (see Figure 2) that WISER delivers to its market targets of small businesses, large companies and public sector organisations are based on three different modes of operations, branded as: while highlighting the various levels of the services using progress bar icons. The services are also highlighted through different colour schemes making it easier for the user to distinguish and recognise the various service options. CyberWISER Light, the first service rollout of WISER was made available in March 2016 to the early assessment pilots and selected organisations within the WISER network. CWL is accessible from the WISER media platform: xxx.xxxxxxxxxx.xx. SMEs and organisations of all sizes can get a first, high-level view of their cyber risk exposure free of charge and with minimum investment in time and human resources. There are two parts to the service: 1. A questionnaire that gives SMEs and organisations a first, high-level view of their cyber risk exposure based on 28 questions collecting and assessing basic information about the organisation and its cyber risk exposure 2. A vulnerability test which detects the vulnerabilities present in a specific web/infrastructure and offers a high-level rough estimation of cyber risk exposure basing on the importance for the company business of the data potentially affected in such target by the vulnerabilities found. While in the CyberWISER Light the issues detected have rather to do with the vulnerabilities of the infrastructure and likely problems that might arise in the short term, in the basic mode of operation this is extended to the detection of issues already happening and informing the user. This solution offers simple functionalities and a basic repository of standard risks, vulnerabilities and threat models and simple cyber risk patterns that can be instantiated by following a lightweight approach to analysis. CyberWISER Essential offers the assessment of the risk based on not only the business and ICT variables indicated by the user in an upgraded version of the one used in the CyberWISER Light, but also on the information obtained from the cyber climate of the user’s infrastructure/web server which is analysed and monitored thanks to sensors installed at the network layer level. The assessment of the impact of cyber risks is based on a set of economic factors with minimal coverage. Decision support is supported by the provision of a list of mitigation measures re...
AutoNDA by SimpleDocs

Related to WISER Cyber Risk Monitoring Services

  • Monitoring Services IDT staff shall, using methods that include face-to-face and other contacts with the member, monitor the services a member receives. This monitoring shall ensure that: a. The member receives the services and supports authorized, arranged for and coordinated by the IDT staff; b. The services and supports identified in the MCP as being provided by natural and community supports are being provided; and c. The quality of the services and supports received is adequate and still necessary to continue to meet the needs and preferences of the member and support the member’s outcomes identified in the MCP.

  • Collection Services General 5-1 5.02 Solid Waste Collection 5-1 5.03 Targeted Recyclable Materials Collection 5-3

  • Engineering Services Definition: Engineering Services includes any service or creative work, the adequate performance of which requires education, training and experience in the application of special knowledge in consulting, investigating, evaluating, planning and designing, engineering principles. Engineering Services covered by the Xxxxxx Architect-Engineers Act (40 U.S.C. 1102) are not covered in the primary scope of OASIS SB. Examples: Service areas that are included under the Engineering Services discipline include, but are not limited to the following: 1. Systems Engineering 2. Advanced Technology Pilots and Trials 3. Alternative Energy Sources and Engineering 4. Configuration Management 5. Concept Development

  • EFT SERVICES If approved, you may conduct any one (1) or more of the EFT services offered by the Credit Union.

  • Support Services Rehabilitation, counselling and EAP’s. Support is strictly non- punitive, and can be accessed at anytime (self-identification of the need for help is strongly encouraged).

  • Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network or non- network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network or non-network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.

  • Interconnection Customer Provided Services The services provided by Interconnection Customer under this LGIA are set forth in Article 9.6 and Article 13.5. 1. Interconnection Customer shall be paid for such services in accordance with Article 11.6.

  • Extra Services District-authorized services outside of the scope in Exhibit “A” or District-authorized reimbursables not included in Architect’s Fee.

  • Hosting Services 13.1 If Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract Hosts Customer Data in connection with an Acquisition, the provisions of Appendix 1, attached hereto and incorporated herein, apply to such Acquisition. 13.2 If the Hosting of Customer Data by Supplier or its subcontractor, affiliate or any other person or entity providing products or services under the Contract contributes to or directly causes a Data Breach, Supplier shall be responsible for the obligations set forth in Appendix 1 related to breach reporting requirements and associated costs. Likewise if such Hosting contributes to or directly causes a Security Incident, Supplier shall be responsible for the obligations set forth in Appendix 1, as applicable. 14 Change Management

  • Billing Services 6 SECTION 3.01.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!