2015 North American International Cyber Summit Hosted by Michigan Governor Rick Snyder

Size: px
Start display at page:

Download "2015 North American International Cyber Summit Hosted by Michigan Governor Rick Snyder"

Transcription

1 2015 North American International Cyber Summit Hosted by Michigan Governor Rick Snyder Monday, October 26, 2015 Monday, October 26, COBO Center, Detroit, MI Start Time Presentation 7:30 AM Registration, Continental Breakfast & Visit with Sponsors COBO Center - Detroit, MI Twitter Hashtag: #MICyberSummit As of October 16, :30 AM Presentation of the Colors by the Michigan State Police Color Guard and performance of the National Anthem by Men of Grace Welcome Speaker: 8:35 AM David Behen, DTMB Director and Michigan Chief Information Officer Local Welcome: 8:40 AM Beth Niblock, CIO, City of Detroit Keynote Speaker: 8:45 AM Michigan Governor Rick Snyder Featured Speaker: Reynold N. Hoover, Major General, USA, Director, Intelligence and Command, Control, Communications, and Computers and Chief 9:10 AM Information Officer

2 Keynote Speaker: You Have Already Been Hacked! How Do You Detect It? The OPM Story Description: Breach detection for the enterprise. Got to have it! What do you need to know? How does your technology work and what do you need to protect it? What questions should you ask, what tools do you need? Ben Cotton was on the frontline for the OPM breach. Listen and learn from this enlightening story. 9:25 AM Ben Cotton, President/CEO, CyTech Services 10:05 AM Networking Break and Visit with Sponsors 10:20 AM Federal Cyber Collaboration Panel Description: Join our panel of federal agency experts who will discuss the world of cyber from the federal perspective. The discussion will include current challenges, and initiatives as well as lessons learned. Law enforcement tools that can assist victims of data breaches will also be discussed. Moderator: Barbara McQuade, U.S. Attorney, Eastern District of Michigan, United States Department of Justice Kelvin Coleman, Branch Chief, Government Engagement, Cybersecurity and Communications, Department of Homeland Security G. Thomas Winterhalter, Supervisory Special Agent, Federal Bureau of Investigation (FBI) Lt. Michael O. Walker, Staff Attorney, Ninth Coast Guard District, United States Coast Guard Diamond/Platinum Roundtable Cyber Discussion: Cyber 911 Are we seeing the precursor of the first "cyber war"? This session will reference the high profile attacks against OPM and other gov/high profile public companies. What implications are associated with the loss of so much sensitive data, what do organizations need to know in order to protect their employees, customers, suppliers? What if anything can be done to limit the damage to data already exposed? We are in the middle of the most important "cyber" event in history. The United States has had no bigger loss, no more significant event (in the digital space) ever. Moderator: Jeffrey S. McLeod, Director, Homeland Security and Public Safety Division, National Governors Association (NGA) Terry Hect, Director, Chief Security Strategist, AT&T Richard Dorough, Senior Managing Director, PwC Peter Romness, Cybersecurity Solutions Lead, U.S. Public Sector, Cisco Systems 11:00 AM Kelly Bissell, Principal, Deloitte & Touche LLP 11:45 AM Networking Break and Visit with Sponsors 12:15 PM Luncheon 1:15 PM Transition from Luncheon to Breakout Sessions 1:25 PM Breakout Sessions:

3 Title: Panel Discussion on Cloud Infrastructure Security (transparency, control and response) Description: Retail hacking, identity theft, industrial espionage, government data breaches, airline interruptions, stock market manipulation-- the world gets more complicated and less secure every day. We will be discussing the evolution from broad persistent threats to more sophisticated attempts targeting businesses daily. Moderator: Raj Patel, Partner, Management Consulting, Plante & Moran Brian Herr, Chief Security Officer, Secure-24 LLC Brigadier General Michael Stone, Assistant Adjutant General - Installations, Michigan National Guard, Department of Military and Veterans Affairs William (Joe) Adams, VP of Research and Cyber Security, Merit Network, Inc. Title: Lessons Learned from the Hacking Frontlines Description: Inside the hearts and minds of a panel of ethical hackers - the good guys! What keeps them up at night? Ideas they want to share with you - and what they think you should know about cybersecurity and threats. It might surprise you! Moderator: Christian Kopacsi, CSO, State of Michigan Christopher Payne, Senior Group Manager, Cyber Security Incident Response Team (CSIRT), Target Matt Carpenter, Principal Security Researcher, Grimm Abraham Jones, Supervisor of Information Services, Spectrum Health Robert Leale, President, CanBusHack, Inc. Title: Combatting the Small Business Cyber Threat: Resources for Prevention and Recovery Description: Small and midsize business are on the target list for hackers. While the larger corporations can recover from a cyber attack, small businesses may not come back. Learn what the most common cyber threats are facing small businesses, how to assess and protect company assets, and how to recover from an attack. NCSA, a 501(c)(3) founded in 2001, is a leading public-private partnership, working with the U.S. Department of Homeland Security, corporate sponsors and nonprofit collaborations to promote cybersecurity and privacy awareness everywhere. The FTC recently launched, "Start with Security", a Data Security program to help small businesses protect data from cyber threats. That material and a workshop for small business created by NCSA and the Council for Better Business Bureaus will be shared and discussed. Speaker(s): Kristin Judge, Director of Special Projects, National Cyber Security Alliance (NCSA) Bill Fanelli, Chief Security Officer, Council of Better Business Bureaus Jacqueline K. Connor, Attorney, Division of Privacy and Identity Protection, Federal Trade Commission (FTC)

4 Title: Raising the Bar: The Michigan Israel Partnership on Cyber Security Description: In order to learn from the best data protection organizations in the world, fight cybercrime, better understand emerging cyberthreats, build new cyberdefense capabilities and strengthen economic development opportunities, Michigan State Government and the State of Israel are taking cyber collaboration and security partnerships to a new level. So what did the Michigan delegation of public and private sector security professionals learn during their visits to Israel? What has been done over the past few years to strengthen ties and build new capabilities? Where does this unique relationship go next to enhance cyber capabilities? This panel session will explore these questions and more in an interactive format that will highlight diverse perspectives from global leaders in cybersecurity. Moderator: Dan Lohrmann, Chief Strategist and Chief Security Officer (CSO), Security Mentor, Inc. Amir Becker, Director of Cyber Cooperation, Embassy of Israel Rod Davenport, Chief Technology Officer, State of Michigan F/Lt. James Ellis, Commander of the Cyber Section, Michigan State Police Title: Quantum Technology: Challenges and Opportunities for Cyber Security Description: Quantum Information Technology is becoming real. The implication for information security is far-reaching. A crisis is looming as the very foundation of cryptography is being challenged. Much of today's public cryptology will be defeated by large scale quantum computers. If a secret needs to stay secret for many years to come, encrypting it using current technologies is inadequate. To over come these challenges, "Post-Quantum Cryptography" has emerged as an active area of research for searching for practical alternatives resilient to quantum attacks. While threatening today's cryptography, quantum information on the other hand enables breakable quantum cryptography. Most remarkably, some quantum cryptographic methods are "untrustworthy", i.e. the "trusted", i.e., require the user's faith on the hardware's integrity. In this talk, Professor Shi will outline these challenges and opportunities without assuming any prior knowledge of the field. A participant will be exposed to this trend of critical importance for information security, and will be able to start the necessary planning for his/her organization's response. Speaker: Yaoyun Shi, Professor, University of Michigan Title: Cyber Range Exercise Description: Stampede is an international, multi-team, remote Capture the Flag exercise designed to challenge cyber security professionals in a real time, force on force setting. Teams work against each other to control the network, requiring them to exhibit their skills in attacking and defending. Stampede will be conducted throughout the day of the Summit. Each team will attempt to penetrate and control elements of critical infrastructure within the Michigan Cyber Range's training environment called Alphaville. 2:10 PM Networking Break and Visit with Sponsors 2:30 PM Breakout Sessions:

5 Title: New Attack Vectors in the Shifting Threat Landscape Description: 2014 brought a surge in the disclosure of critical vulnerabilities to foundational frameworks branded with logos and catchy names, but what were the real reasons behind vulnerability disclosures reaching the highest rate in recorded history last year? Attackers tailored the Citadel malware to infiltrate new targets, making it imperative for organizations to defend themselves with more than just a single layer of protection. This session will provide information on attacks and report recent trends. Speaker: Chris Poulin, Research Strategist, X-Force, IBM Corporation Title: The Legal Issues of Responding to Data Breaches Description: Data breaches implicate not only serious technology, security and business concerns for victims of cybersecurity incidents, but also legal concerns as well. The role of legal counsel in cybersecurity response is a growing and critical aspect, and businesses should involved knowledgeable data breach counsel at the first sign of trouble, extending through the investigation into the scope and nature of the incident, and continuing in to the breach response areas. This session will help attendees (a) identify situations where legal counsel should be involved, (b) understand the risks and benefits of including counsel throughout the data breach process, and (c) recognize the potential legal liabilities arising from a data breach. Topics covered in the process include cybersecurity investigation, confidentiality, consumer notification requirements, government inquiries, customer and shareholder litigation, and business partner litigation. Speaker(s): Michael P. Hindelang, Partner, Honigman Miller Scwhartz and Cohn LLP B. Michael Ortwein III, Partner, Honigman Miller Schwartz and Cohn LLP Title: Veteran Talent in IT and Cybersecurity Description: The Michigan Veterans Affairs Agency will discuss the advanced IT and cybersecurity skill sets that can be found within the military and how Michigan is working to assist companies in locating veterans with these skill sets for employment in Michigan. It is anticipated that an additional 50,000 veterans will transition to Michigan by Today's returning veterans are highly trainable, adaptive and experienced. They can transition into many different work experiences and environments, and they bring a sense of commitment and mission to whatever job they take on. A select group of veterans will participate in the presentation to speak to industry on how their skill sets and experience, and those of veterans like them, can benefit from Michigan's IT industry. Attendees will learn which military occupational areas may be a good fit for their career openings and how to attract and retain top veteran talent in these areas. Speaker(s): Jeff Barnes, Director of the Michigan Veterans Affairs Agency (MVAA) Kristina Leonardi, Director of Strategy, Michigan Veterans Affairs Agency Bradley Bunch, U.S. Air Force/U.S. Army Christopher Conger, U.S. Air Force Joseph Zane, U.S. Marine Corps

6 Title: Anatomy of a Cyber Crime Description: An in-depth overview of the steps taken to successfully investigate a cyber event. Law enforcement officials will take the attendees through the steps required to initiate a criminal incident. Identification of incident, determination of the intent, intelligence gathering, ip address and social medial tracing, search warrant consideration and service, suspect interview and interrogation, and prosecution considerations. Speaker(s): Jay Poupard, Detective Lieutenant, Michigan Cyber Command Center (MC3) Danny Cook, Detective Sergeant, Michigan State Police Title: Covering Your Assets, a Guide to Protecting your Data and How to Sell the Proper Security Solutions to Your Board Description: Has your neck been on the line for protecting your company data assets, but declined for additional budget on cyber-security measures? This session will visit the value of data and it's protection, along with tips on garnering buy-in from your executives and boards. Speaker: Yan Ness, CEO, Online Tech Title: Cyber Range Exercise Description: Stampede is an international, multi-team, remote Capture the Flag exercise designed to challenge cyber security professionals in a real time, force on force setting. Teams work against each other to control the network, requiring them to exhibit their skills in attacking and defending. Stampede will be conducted throughout the day of the Summit. Each team will attempt to penetrate and control elements of critical infrastructure within the Michigan Cyber Range's training environment called Alphaville. 3:15 PM Networking Break and Visit with Sponsors 3:30 PM Breakout Sessions: Title: Preventing Data Breaches with Risk-Aware Authentication and Session Management Description: In both government agencies and corporations alike, traditional authentication and authorization defenses against fraudulent access attempts have only temporarily stopped cybercriminals and have made it harder for legitimate users. Multi-function authentication and single sign-on can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during this session. Attend this session to learn two best practices for preventing data breaches caused by fraudulent access and session hijacking: user behavioral profiling to increase authentication security; and risk-aware session management to prevent session hijacking using continuous device authentication and risk-based authorization. Speaker: Martin Yam, Senior Advisor, CA Technologies

7 Title: Automotive Cybersecurity - Why it Matters, How its Different, What is the Threat and What Can We do About It Description: The modern car is a marvel of code and communications. This evolution of the automobile from mechanical conveyance to mobile office and communications hub was not a long-planned metamorphosis, and both coding and architectural choices which made sense when cars were not connected are now design artifacts which must be protected and eventually changed now that cars will be denizens of the Internet of Things (IoT). What are the real issues here, and why doesn't traditional IT security work for cars? This session will help attendees understand the core issues of how and why automotive cybersecurity is different from standard IT security and why the response and solutions must therefore be different, too. Speaker: Karl Heimer, Principal, Auto Immune, Inc. Title: Isolating Untrusted Software on Secure Systems - Hypervisor Case Study Description: The computing platforms in aircraft, ground vehicles, and medical electronics require low size, weight and power (SWaP) to be broadly adopted with a goal of consolidating multiple application on one computing platform. This consolidation creates a challenge for embedded computer systems to run security-critical and/or safety-critical applications on the same computing platform as non critical applications. While new applications may provide desired functionality, some applications may be untrusted, resulting in a vulnerability to the system. The challenge is to provide separation, isolation and resiliency to enable the use of these "non-critical" functions while assuring that they will not interrupt or interfere with critical functions such as flight controls (aerospace), anti-lock brakes (automotive) and sensitive data sharing (medical and defense). This is case study an embedded hypervisor will be demonstrated that provides this separation and security. Speaker: Dr. Gregg Wildes, Business Development Manager, DornerWorks Title: Cyber Warfare: Got Intelligence? Description: Some people never see the punch coming. The threat landscape just keeps getting more complicated. This session will share intelligence and analysis of global threat activity. Intelligence should always lead to action and this session will look at what the data means and what we must be doing based on this intelligence. Forewarned is forearmed, and this session will prepare you to block the next punch coming your way. Speaker: Kevin Haley, Director, Security Technology and Response, Symantec Title: Cyber Insurance: How to Investigate the Right Coverage for Your Company Description: Practitioner's view of how to evaluate your cyber insurance needs. How do you select an insurance broker? What to expect during the process of purchasing cyber insurance along with a set of questions to ask insurance brokers. Benefit and takeaways from this session include: insight into the process of working with an insurance broker and how to prepare for meetings, familiarity with the cyber insurance purchasing process and role of insurance in managing cyber risk. Speaker: Dr. Faith Heikkila, CISO and Privacy Officer, Greenleaf Trust

8 Title: Cyber Range Exercise Description: Stampede is an international, multi-team, remote Capture the Flag exercise designed to challenge cyber security professionals in a real time, force on force setting. Teams work against each other to control the network, requiring them to exhibit their skills in attacking and defending. Stampede will be conducted throughout the day of the Summit. Each team will attempt to penetrate and control elements of critical infrastructure within the Michigan Cyber Range's training environment called Alphaville. 4:15 PM Adjournment

Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder

Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder Friday, October 25, 2013 The Suburban Collection Showplace - Novi, Michigan Tentative Agenda as of October 4, 2013 Friday, October 25,

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World

Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Presidential Summit Reveals Cybersecurity Concerns, Trends

Presidential Summit Reveals Cybersecurity Concerns, Trends Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

The Computerworld Honors Program

The Computerworld Honors Program The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

Big 4 Information Security Forum

Big 4 Information Security Forum San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL

More information

Cybersecurity y Managing g the Risks

Cybersecurity y Managing g the Risks Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking

More information

White Paper on Financial Industry Regulatory Climate

White Paper on Financial Industry Regulatory Climate White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during

More information

Cyber Insurance: How to Investigate the Right Coverage for Your Company

Cyber Insurance: How to Investigate the Right Coverage for Your Company 6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

Corporate Perspectives On Cybersecurity: A Survey Of Execs

Corporate Perspectives On Cybersecurity: A Survey Of Execs Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Perspectives On Cybersecurity: A Survey

More information

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC. Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies

More information

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council

Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

INFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh

INFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh INFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh By Mark Rush and Joe Valenti K&L Gates Cyber crime is a serious threat it cripples companies, damages economies,

More information

IDENTIFYING AND RESPONDING TO DATA BREACHES

IDENTIFYING AND RESPONDING TO DATA BREACHES IDENTIFYING AND RESPONDING TO DATA BREACHES Michael P. Hindelang Honigman Miller Schwartz and Cohn LLP October 14, 2015 Merit Security Summit DATA SECURITY RISKS, THREATS & REAL WORLD EXAMPLES OVERVIEW

More information

The Top Ten of Information Security - For 2015

The Top Ten of Information Security - For 2015 7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.

More information

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014 www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the

More information

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity; NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

How To Buy Cyber Insurance

How To Buy Cyber Insurance 10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!

More information

Surviving the Ever Changing Threat Landscape

Surviving the Ever Changing Threat Landscape Surviving the Ever Changing Threat Landscape Kevin Jordan Cyber Security Specialist Dell GLBA FFIEC NCUA PCI HIPAA NERC CIP FISMA 700+ Percentage of U.S. adults who Federal named online and banking state

More information

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow 2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer

More information

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP

Delaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats

More information

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360

More information

Working with the FBI

Working with the FBI Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement

More information

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBER, INFORMATION SECURITY - OVERVIEW A cyber security breach is no longer just an

More information

FINAL // FOR OFFICIAL USE ONLY. William Noonan

FINAL // FOR OFFICIAL USE ONLY. William Noonan FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States

More information

State of Michigan Cyber Security Training

State of Michigan Cyber Security Training Michigan Cybersecurity Initiatives Reduce Risks Through Improved Employee Training EXECUTIVE SUMMARY Objectives Reduce security risks through bettertrained employees and residents Coordinate with private

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats; GermanoLawLLC provides client- focused counsel and assistance regarding cybersecurity and data privacy concerns. We help companies understand, prepare for and address internal and external cybersecurity

More information

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting

More information

1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches.

1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches. Part 1: Internal & External Data Breach Vulnerabilities Presented on: Thursday, February 12, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Joe Majka CSO at Verifone 1 Breakdown

More information

Dallas, TX September 10. Chairman: Lance Spitzner

Dallas, TX September 10. Chairman: Lance Spitzner Dallas, TX September 10 Chairman: Lance Spitzner AGENDA All Summit Sessions will be held in the Vista Ballroom (unless noted). All approved presentations will be available online following the Summit

More information

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan

More information

Train Like You Will Fight

Train Like You Will Fight Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content

More information

Presented By: Corporate Security Information Security Treasury Management

Presented By: Corporate Security Information Security Treasury Management Presented By: Corporate Security Information Security Treasury Management Is Your Business Prepared for a Cyber Incident? It s not a matter of if, it s a matter of when Cyber Attacks are on the Rise; Physical

More information

Managing cyber risks with insurance

Managing cyber risks with insurance www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

CES 2016 AGENDA. Bally s Skyview Conference Center. Bally s, Las Vegas. Government Business Executive Forum. Ramsey Pub and Grill

CES 2016 AGENDA. Bally s Skyview Conference Center. Bally s, Las Vegas. Government Business Executive Forum. Ramsey Pub and Grill CES 2016 AGENDA January 2, 2016 2:00PM 5:00PM Bally s, Las Vegas 5:30PM 7:30PM Government Business Executive Forum Reception Ramsey Pub and Grill Caesar s Palace January 3, 2016 10:00AM 4:00PM 8:00AM 3:00PM

More information

4A Healthcare Data Security & Privacy

4A Healthcare Data Security & Privacy 4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits

More information

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF

More information

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.

More information

Establishing a State Cyber Crimes Unit White Paper

Establishing a State Cyber Crimes Unit White Paper Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

OCIE CYBERSECURITY INITIATIVE

OCIE CYBERSECURITY INITIATIVE Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.

More information

Cyber threats are growing.

Cyber threats are growing. Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016 The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,

More information

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work National Cyber Security Awareness Month Week Two: Creating a Culture of Cybersecurity at Work Webinar Recording and Evaluation Survey This webinar is being recorded and will be made available online to

More information

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches

October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title

More information

THE WHITE HOUSE Office of the Press Secretary

THE WHITE HOUSE Office of the Press Secretary FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly

More information

Managing Cyber Attacks

Managing Cyber Attacks Managing Cyber Attacks Regulators and Industry Participants Discuss Ways to Strengthen Defenses By Joanne Morrison June 25, 2015 Cybersecurity risks and testing are a major concern of regulators and market

More information

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson

More information

Tuesday, June 04, 2013 -- 2013 NYS Cyber Security Conference

Tuesday, June 04, 2013 -- 2013 NYS Cyber Security Conference About Us Zogby Analytics conducts a wide variety of surveys internationally and nationally in industries, including banking, IT, medical devices, government agencies, colleges and universities, non-profits,

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

Recognize Nefarious Cyber Activity and Catch Those Responsible with IBM InfoSphere Entity Analytic Solutions

Recognize Nefarious Cyber Activity and Catch Those Responsible with IBM InfoSphere Entity Analytic Solutions Building a Smarter Planet with Advanced Cyber Security Solutions Recognize Nefarious Cyber Activity and Catch Those Responsible with Highlights g Cyber Security Solutions from IBM InfoSphere Entity Analytic

More information

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system

More information

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015 Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology

More information

Adopting a Cybersecurity Framework for Governance and Risk Management

Adopting a Cybersecurity Framework for Governance and Risk Management The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance

More information

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015

Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015 Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

I ve been breached! Now what?

I ve been breached! Now what? I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have

More information

US House Energy and Commerce Committee. Commerce, Manufacturing, and Trade Subcommittee

US House Energy and Commerce Committee. Commerce, Manufacturing, and Trade Subcommittee US House Energy and Commerce Committee Commerce, Manufacturing, and Trade Subcommittee Protecting Consumer Information: Can Data Braches Be Prevented? February 5, 2014 Congressmen in Attendance: Rep. Lee

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations

More information

Aftermath of a Data Breach Study

Aftermath of a Data Breach Study Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath

More information

Cyber Security in the Financial Industry

Cyber Security in the Financial Industry Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today

More information

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the

More information

Cyber-Security Risk in the Global Organization:

Cyber-Security Risk in the Global Organization: Cyber-Security Risk in the Global Organization: Trends, Challenges and Strategies for Effective Management David Childers, CCEP, CIPP CEO, Compli Todd Carroll Assistant Special Agent in Charge, FBI Three

More information

The Impact of Cybercrime on Business

The Impact of Cybercrime on Business The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted

More information

PwC Cybersecurity Briefing

PwC Cybersecurity Briefing www.pwc.com/cybersecurity Cybersecurity Briefing June 25, 2014 The views expressed in these slides are solely the views of the presenters and do not necessarily reflect the views of the PCAOB, the members

More information

Exercising Your Enterprise Cyber Response Crisis Management Capabilities

Exercising Your Enterprise Cyber Response Crisis Management Capabilities Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices

Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Detection, analysis, and understanding of threat

More information

Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc.

Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc. Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc. Before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the House Committee on

More information

Identifying Cyber Risks and How they Impact Your Business

Identifying Cyber Risks and How they Impact Your Business 10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates

More information

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap

National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap FOR IMMEDIATE RELEASE National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap Closing the Cyber Talent Gap and Educating the Workforce of the Future

More information

OCIE Technology Controls Program

OCIE Technology Controls Program OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview

More information

Cyber Security. Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP

Cyber Security. Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP Cyber Security Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP Speakers: Keith Overly, Executive Director, Ohio Deferred Compensation Program Raj Patel, Partner, Plante & Moran, PLLC

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES. second edition

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES. second edition CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES second edition The information provided in this document is presented as a courtesy to be used for informational purposes only.

More information

Cyber Liability & Data Breach Insurance Claims

Cyber Liability & Data Breach Insurance Claims Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY BY DR. BRIAN MCELYEA AND DR. EMILY DARRAJ Approved for Public Release: Case # 16-0276 NORTHROP GRUMMAN WHITE PAPER 2016 Northrop Grumman

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

Developing Secure Software in the Age of Advanced Persistent Threats

Developing Secure Software in the Age of Advanced Persistent Threats Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Supplier Vigilance: A Critical Layer of Defense

Supplier Vigilance: A Critical Layer of Defense Supplier Vigilance: A Critical Layer of Defense Lockheed Martin Information Security 1 Supply Chain Cyber Security Lockheed Martin October 23, 2013 Debbie Stuckey Waide Jones, CISSP 2 Synopsis Lockheed

More information