2015 North American International Cyber Summit Hosted by Michigan Governor Rick Snyder
|
|
- Alexandrina Dickerson
- 8 years ago
- Views:
Transcription
1 2015 North American International Cyber Summit Hosted by Michigan Governor Rick Snyder Monday, October 26, 2015 Monday, October 26, COBO Center, Detroit, MI Start Time Presentation 7:30 AM Registration, Continental Breakfast & Visit with Sponsors COBO Center - Detroit, MI Twitter Hashtag: #MICyberSummit As of October 16, :30 AM Presentation of the Colors by the Michigan State Police Color Guard and performance of the National Anthem by Men of Grace Welcome Speaker: 8:35 AM David Behen, DTMB Director and Michigan Chief Information Officer Local Welcome: 8:40 AM Beth Niblock, CIO, City of Detroit Keynote Speaker: 8:45 AM Michigan Governor Rick Snyder Featured Speaker: Reynold N. Hoover, Major General, USA, Director, Intelligence and Command, Control, Communications, and Computers and Chief 9:10 AM Information Officer
2 Keynote Speaker: You Have Already Been Hacked! How Do You Detect It? The OPM Story Description: Breach detection for the enterprise. Got to have it! What do you need to know? How does your technology work and what do you need to protect it? What questions should you ask, what tools do you need? Ben Cotton was on the frontline for the OPM breach. Listen and learn from this enlightening story. 9:25 AM Ben Cotton, President/CEO, CyTech Services 10:05 AM Networking Break and Visit with Sponsors 10:20 AM Federal Cyber Collaboration Panel Description: Join our panel of federal agency experts who will discuss the world of cyber from the federal perspective. The discussion will include current challenges, and initiatives as well as lessons learned. Law enforcement tools that can assist victims of data breaches will also be discussed. Moderator: Barbara McQuade, U.S. Attorney, Eastern District of Michigan, United States Department of Justice Kelvin Coleman, Branch Chief, Government Engagement, Cybersecurity and Communications, Department of Homeland Security G. Thomas Winterhalter, Supervisory Special Agent, Federal Bureau of Investigation (FBI) Lt. Michael O. Walker, Staff Attorney, Ninth Coast Guard District, United States Coast Guard Diamond/Platinum Roundtable Cyber Discussion: Cyber 911 Are we seeing the precursor of the first "cyber war"? This session will reference the high profile attacks against OPM and other gov/high profile public companies. What implications are associated with the loss of so much sensitive data, what do organizations need to know in order to protect their employees, customers, suppliers? What if anything can be done to limit the damage to data already exposed? We are in the middle of the most important "cyber" event in history. The United States has had no bigger loss, no more significant event (in the digital space) ever. Moderator: Jeffrey S. McLeod, Director, Homeland Security and Public Safety Division, National Governors Association (NGA) Terry Hect, Director, Chief Security Strategist, AT&T Richard Dorough, Senior Managing Director, PwC Peter Romness, Cybersecurity Solutions Lead, U.S. Public Sector, Cisco Systems 11:00 AM Kelly Bissell, Principal, Deloitte & Touche LLP 11:45 AM Networking Break and Visit with Sponsors 12:15 PM Luncheon 1:15 PM Transition from Luncheon to Breakout Sessions 1:25 PM Breakout Sessions:
3 Title: Panel Discussion on Cloud Infrastructure Security (transparency, control and response) Description: Retail hacking, identity theft, industrial espionage, government data breaches, airline interruptions, stock market manipulation-- the world gets more complicated and less secure every day. We will be discussing the evolution from broad persistent threats to more sophisticated attempts targeting businesses daily. Moderator: Raj Patel, Partner, Management Consulting, Plante & Moran Brian Herr, Chief Security Officer, Secure-24 LLC Brigadier General Michael Stone, Assistant Adjutant General - Installations, Michigan National Guard, Department of Military and Veterans Affairs William (Joe) Adams, VP of Research and Cyber Security, Merit Network, Inc. Title: Lessons Learned from the Hacking Frontlines Description: Inside the hearts and minds of a panel of ethical hackers - the good guys! What keeps them up at night? Ideas they want to share with you - and what they think you should know about cybersecurity and threats. It might surprise you! Moderator: Christian Kopacsi, CSO, State of Michigan Christopher Payne, Senior Group Manager, Cyber Security Incident Response Team (CSIRT), Target Matt Carpenter, Principal Security Researcher, Grimm Abraham Jones, Supervisor of Information Services, Spectrum Health Robert Leale, President, CanBusHack, Inc. Title: Combatting the Small Business Cyber Threat: Resources for Prevention and Recovery Description: Small and midsize business are on the target list for hackers. While the larger corporations can recover from a cyber attack, small businesses may not come back. Learn what the most common cyber threats are facing small businesses, how to assess and protect company assets, and how to recover from an attack. NCSA, a 501(c)(3) founded in 2001, is a leading public-private partnership, working with the U.S. Department of Homeland Security, corporate sponsors and nonprofit collaborations to promote cybersecurity and privacy awareness everywhere. The FTC recently launched, "Start with Security", a Data Security program to help small businesses protect data from cyber threats. That material and a workshop for small business created by NCSA and the Council for Better Business Bureaus will be shared and discussed. Speaker(s): Kristin Judge, Director of Special Projects, National Cyber Security Alliance (NCSA) Bill Fanelli, Chief Security Officer, Council of Better Business Bureaus Jacqueline K. Connor, Attorney, Division of Privacy and Identity Protection, Federal Trade Commission (FTC)
4 Title: Raising the Bar: The Michigan Israel Partnership on Cyber Security Description: In order to learn from the best data protection organizations in the world, fight cybercrime, better understand emerging cyberthreats, build new cyberdefense capabilities and strengthen economic development opportunities, Michigan State Government and the State of Israel are taking cyber collaboration and security partnerships to a new level. So what did the Michigan delegation of public and private sector security professionals learn during their visits to Israel? What has been done over the past few years to strengthen ties and build new capabilities? Where does this unique relationship go next to enhance cyber capabilities? This panel session will explore these questions and more in an interactive format that will highlight diverse perspectives from global leaders in cybersecurity. Moderator: Dan Lohrmann, Chief Strategist and Chief Security Officer (CSO), Security Mentor, Inc. Amir Becker, Director of Cyber Cooperation, Embassy of Israel Rod Davenport, Chief Technology Officer, State of Michigan F/Lt. James Ellis, Commander of the Cyber Section, Michigan State Police Title: Quantum Technology: Challenges and Opportunities for Cyber Security Description: Quantum Information Technology is becoming real. The implication for information security is far-reaching. A crisis is looming as the very foundation of cryptography is being challenged. Much of today's public cryptology will be defeated by large scale quantum computers. If a secret needs to stay secret for many years to come, encrypting it using current technologies is inadequate. To over come these challenges, "Post-Quantum Cryptography" has emerged as an active area of research for searching for practical alternatives resilient to quantum attacks. While threatening today's cryptography, quantum information on the other hand enables breakable quantum cryptography. Most remarkably, some quantum cryptographic methods are "untrustworthy", i.e. the "trusted", i.e., require the user's faith on the hardware's integrity. In this talk, Professor Shi will outline these challenges and opportunities without assuming any prior knowledge of the field. A participant will be exposed to this trend of critical importance for information security, and will be able to start the necessary planning for his/her organization's response. Speaker: Yaoyun Shi, Professor, University of Michigan Title: Cyber Range Exercise Description: Stampede is an international, multi-team, remote Capture the Flag exercise designed to challenge cyber security professionals in a real time, force on force setting. Teams work against each other to control the network, requiring them to exhibit their skills in attacking and defending. Stampede will be conducted throughout the day of the Summit. Each team will attempt to penetrate and control elements of critical infrastructure within the Michigan Cyber Range's training environment called Alphaville. 2:10 PM Networking Break and Visit with Sponsors 2:30 PM Breakout Sessions:
5 Title: New Attack Vectors in the Shifting Threat Landscape Description: 2014 brought a surge in the disclosure of critical vulnerabilities to foundational frameworks branded with logos and catchy names, but what were the real reasons behind vulnerability disclosures reaching the highest rate in recorded history last year? Attackers tailored the Citadel malware to infiltrate new targets, making it imperative for organizations to defend themselves with more than just a single layer of protection. This session will provide information on attacks and report recent trends. Speaker: Chris Poulin, Research Strategist, X-Force, IBM Corporation Title: The Legal Issues of Responding to Data Breaches Description: Data breaches implicate not only serious technology, security and business concerns for victims of cybersecurity incidents, but also legal concerns as well. The role of legal counsel in cybersecurity response is a growing and critical aspect, and businesses should involved knowledgeable data breach counsel at the first sign of trouble, extending through the investigation into the scope and nature of the incident, and continuing in to the breach response areas. This session will help attendees (a) identify situations where legal counsel should be involved, (b) understand the risks and benefits of including counsel throughout the data breach process, and (c) recognize the potential legal liabilities arising from a data breach. Topics covered in the process include cybersecurity investigation, confidentiality, consumer notification requirements, government inquiries, customer and shareholder litigation, and business partner litigation. Speaker(s): Michael P. Hindelang, Partner, Honigman Miller Scwhartz and Cohn LLP B. Michael Ortwein III, Partner, Honigman Miller Schwartz and Cohn LLP Title: Veteran Talent in IT and Cybersecurity Description: The Michigan Veterans Affairs Agency will discuss the advanced IT and cybersecurity skill sets that can be found within the military and how Michigan is working to assist companies in locating veterans with these skill sets for employment in Michigan. It is anticipated that an additional 50,000 veterans will transition to Michigan by Today's returning veterans are highly trainable, adaptive and experienced. They can transition into many different work experiences and environments, and they bring a sense of commitment and mission to whatever job they take on. A select group of veterans will participate in the presentation to speak to industry on how their skill sets and experience, and those of veterans like them, can benefit from Michigan's IT industry. Attendees will learn which military occupational areas may be a good fit for their career openings and how to attract and retain top veteran talent in these areas. Speaker(s): Jeff Barnes, Director of the Michigan Veterans Affairs Agency (MVAA) Kristina Leonardi, Director of Strategy, Michigan Veterans Affairs Agency Bradley Bunch, U.S. Air Force/U.S. Army Christopher Conger, U.S. Air Force Joseph Zane, U.S. Marine Corps
6 Title: Anatomy of a Cyber Crime Description: An in-depth overview of the steps taken to successfully investigate a cyber event. Law enforcement officials will take the attendees through the steps required to initiate a criminal incident. Identification of incident, determination of the intent, intelligence gathering, ip address and social medial tracing, search warrant consideration and service, suspect interview and interrogation, and prosecution considerations. Speaker(s): Jay Poupard, Detective Lieutenant, Michigan Cyber Command Center (MC3) Danny Cook, Detective Sergeant, Michigan State Police Title: Covering Your Assets, a Guide to Protecting your Data and How to Sell the Proper Security Solutions to Your Board Description: Has your neck been on the line for protecting your company data assets, but declined for additional budget on cyber-security measures? This session will visit the value of data and it's protection, along with tips on garnering buy-in from your executives and boards. Speaker: Yan Ness, CEO, Online Tech Title: Cyber Range Exercise Description: Stampede is an international, multi-team, remote Capture the Flag exercise designed to challenge cyber security professionals in a real time, force on force setting. Teams work against each other to control the network, requiring them to exhibit their skills in attacking and defending. Stampede will be conducted throughout the day of the Summit. Each team will attempt to penetrate and control elements of critical infrastructure within the Michigan Cyber Range's training environment called Alphaville. 3:15 PM Networking Break and Visit with Sponsors 3:30 PM Breakout Sessions: Title: Preventing Data Breaches with Risk-Aware Authentication and Session Management Description: In both government agencies and corporations alike, traditional authentication and authorization defenses against fraudulent access attempts have only temporarily stopped cybercriminals and have made it harder for legitimate users. Multi-function authentication and single sign-on can be a powerful combination to mitigate the threat of data breaches while providing a convenient user experience, but is that enough? What happens if credentials are stolen? What can be accessed during this session. Attend this session to learn two best practices for preventing data breaches caused by fraudulent access and session hijacking: user behavioral profiling to increase authentication security; and risk-aware session management to prevent session hijacking using continuous device authentication and risk-based authorization. Speaker: Martin Yam, Senior Advisor, CA Technologies
7 Title: Automotive Cybersecurity - Why it Matters, How its Different, What is the Threat and What Can We do About It Description: The modern car is a marvel of code and communications. This evolution of the automobile from mechanical conveyance to mobile office and communications hub was not a long-planned metamorphosis, and both coding and architectural choices which made sense when cars were not connected are now design artifacts which must be protected and eventually changed now that cars will be denizens of the Internet of Things (IoT). What are the real issues here, and why doesn't traditional IT security work for cars? This session will help attendees understand the core issues of how and why automotive cybersecurity is different from standard IT security and why the response and solutions must therefore be different, too. Speaker: Karl Heimer, Principal, Auto Immune, Inc. Title: Isolating Untrusted Software on Secure Systems - Hypervisor Case Study Description: The computing platforms in aircraft, ground vehicles, and medical electronics require low size, weight and power (SWaP) to be broadly adopted with a goal of consolidating multiple application on one computing platform. This consolidation creates a challenge for embedded computer systems to run security-critical and/or safety-critical applications on the same computing platform as non critical applications. While new applications may provide desired functionality, some applications may be untrusted, resulting in a vulnerability to the system. The challenge is to provide separation, isolation and resiliency to enable the use of these "non-critical" functions while assuring that they will not interrupt or interfere with critical functions such as flight controls (aerospace), anti-lock brakes (automotive) and sensitive data sharing (medical and defense). This is case study an embedded hypervisor will be demonstrated that provides this separation and security. Speaker: Dr. Gregg Wildes, Business Development Manager, DornerWorks Title: Cyber Warfare: Got Intelligence? Description: Some people never see the punch coming. The threat landscape just keeps getting more complicated. This session will share intelligence and analysis of global threat activity. Intelligence should always lead to action and this session will look at what the data means and what we must be doing based on this intelligence. Forewarned is forearmed, and this session will prepare you to block the next punch coming your way. Speaker: Kevin Haley, Director, Security Technology and Response, Symantec Title: Cyber Insurance: How to Investigate the Right Coverage for Your Company Description: Practitioner's view of how to evaluate your cyber insurance needs. How do you select an insurance broker? What to expect during the process of purchasing cyber insurance along with a set of questions to ask insurance brokers. Benefit and takeaways from this session include: insight into the process of working with an insurance broker and how to prepare for meetings, familiarity with the cyber insurance purchasing process and role of insurance in managing cyber risk. Speaker: Dr. Faith Heikkila, CISO and Privacy Officer, Greenleaf Trust
8 Title: Cyber Range Exercise Description: Stampede is an international, multi-team, remote Capture the Flag exercise designed to challenge cyber security professionals in a real time, force on force setting. Teams work against each other to control the network, requiring them to exhibit their skills in attacking and defending. Stampede will be conducted throughout the day of the Summit. Each team will attempt to penetrate and control elements of critical infrastructure within the Michigan Cyber Range's training environment called Alphaville. 4:15 PM Adjournment
Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder
Michigan Cyber Summit 2013 Hosted by Michigan Governor Rick Snyder Friday, October 25, 2013 The Suburban Collection Showplace - Novi, Michigan Tentative Agenda as of October 4, 2013 Friday, October 25,
More information2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy
2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,
More informationCyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World
Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationPresidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,
More informationCyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
More informationCyber crime risk management protecting your business 4 November 2015
Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC
More informationALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November
More informationThe Computerworld Honors Program
The Computerworld Honors Program Honoring those who use Information Technology to benefit society Status: Laureate Final Copy of Case Study Year: 2013 Organization Name: Cybersecurity and Infrastructure
More informationCyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
More informationBig 4 Information Security Forum
San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL
More informationCybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
More informationWhite Paper on Financial Industry Regulatory Climate
White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during
More informationCyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationCorporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Perspectives On Cybersecurity: A Survey
More informationExperience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
More informationHealthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council
Healthcare Cybersecurity Perspectives from the Michigan Healthcare Cybersecurity Council Presented by Doug Copley, Chairman Michigan Healthcare Cybersecurity Council Mr. Chairman and Committee Members,
More informationU. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
More informationINFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh
INFORMATION SHARING What Companies Can Learn from Cybersecurity Resources in Pittsburgh By Mark Rush and Joe Valenti K&L Gates Cyber crime is a serious threat it cripples companies, damages economies,
More informationIDENTIFYING AND RESPONDING TO DATA BREACHES
IDENTIFYING AND RESPONDING TO DATA BREACHES Michael P. Hindelang Honigman Miller Schwartz and Cohn LLP October 14, 2015 Merit Security Summit DATA SECURITY RISKS, THREATS & REAL WORLD EXAMPLES OVERVIEW
More informationThe Top Ten of Information Security - For 2015
7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.
More informationDefending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
More informationCYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
More informationInto the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
More informationKeynote: FBI Wednesday, February 4 noon 1:10 p.m.
Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the
More informationNGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;
NGA Paper Act and Adjust: A Call to Action for Governors for Cybersecurity challenges facing the nation. Although implementing policies and practices that will make state systems and data more secure will
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationHow To Buy Cyber Insurance
10-26-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
More informationwww.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
More informationCyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
More informationCybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
More information$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP
David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Global Cyber Crime is the fastest growing economic crime Cyber Crime is more lucrative than trafficking drugs!
More informationSurviving the Ever Changing Threat Landscape
Surviving the Ever Changing Threat Landscape Kevin Jordan Cyber Security Specialist Dell GLBA FFIEC NCUA PCI HIPAA NERC CIP FISMA 700+ Percentage of U.S. adults who Federal named online and banking state
More information2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow
2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer
More informationDelaware Cyber Security Workshop September 29, 2015. William R. Denny, Esquire Potter Anderson & Corroon LLP
Changing Legal Landscape in Cybersecurity: Implications for Business Delaware Cyber Security Workshop September 29, 2015 William R. Denny, Esquire Potter Anderson & Corroon LLP Agenda Growing Cyber Threats
More informationHPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042
HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360
More informationWorking with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
More informationCYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO
CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM WWW.CYBERSTRAT.CO INFO@CYBERSTRAT.CO CYBER, INFORMATION SECURITY - OVERVIEW A cyber security breach is no longer just an
More informationFINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
More informationState of Michigan Cyber Security Training
Michigan Cybersecurity Initiatives Reduce Risks Through Improved Employee Training EXECUTIVE SUMMARY Objectives Reduce security risks through bettertrained employees and residents Coordinate with private
More informationWelcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc
Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software
More informationunderstanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;
GermanoLawLLC provides client- focused counsel and assistance regarding cybersecurity and data privacy concerns. We help companies understand, prepare for and address internal and external cybersecurity
More informationCombatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
More information1. Ask what your financial institution knows or has personally experienced with regard to internal and external data breaches.
Part 1: Internal & External Data Breach Vulnerabilities Presented on: Thursday, February 12, 2 3 ET Co presented by: Ann Davidson VP of Risk Consulting at Allied Solutions Joe Majka CSO at Verifone 1 Breakdown
More informationDallas, TX September 10. Chairman: Lance Spitzner
Dallas, TX September 10 Chairman: Lance Spitzner AGENDA All Summit Sessions will be held in the Vista Ballroom (unless noted). All approved presentations will be available online following the Summit
More informationTestimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies
Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan
More informationTrain Like You Will Fight
Train Like You Will Fight Reliability First Workshop 1 October 2015 Dr. Joe Adams Disclaimer 2 The content of this presentation is based on personal and professional experience of the speaker. The content
More informationPresented By: Corporate Security Information Security Treasury Management
Presented By: Corporate Security Information Security Treasury Management Is Your Business Prepared for a Cyber Incident? It s not a matter of if, it s a matter of when Cyber Attacks are on the Rise; Physical
More informationManaging cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
More informationCybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
More informationCES 2016 AGENDA. Bally s Skyview Conference Center. Bally s, Las Vegas. Government Business Executive Forum. Ramsey Pub and Grill
CES 2016 AGENDA January 2, 2016 2:00PM 5:00PM Bally s, Las Vegas 5:30PM 7:30PM Government Business Executive Forum Reception Ramsey Pub and Grill Caesar s Palace January 3, 2016 10:00AM 4:00PM 8:00AM 3:00PM
More information4A Healthcare Data Security & Privacy
4A Healthcare Data Security & Privacy Symposium 2015 Banner Program Leaders Ben Goodman Developed in collaboration with Lisa Clark Conference Mission Health and medical regulators are promising audits
More informationDEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF
More informationCybersecurity Report on Small Business: Study Shows Gap between Needs and Actions
SURVEY REPORT: cyber security Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions Confidence in a connected world. Executive summary An online survey revealed that while U.S.
More informationEstablishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
More informationExecutive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
More informationOCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
More informationCyber threats are growing.
Cyber threats are growing. So are your career opportunities. Put the future of your cybersecurity career in the hands of a respected online education leader. Everything you need to succeed. Excelsior College
More informationOil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
More informationAssessing the strength of your security operating model
www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems
More informationThe Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016
The Future of Data Breach Risk Management Response and Recovery Increasing electronic product life and reliability The Cybersecurity Forum April 14, 2016 Today s Topics About Merchants Information Solutions,
More informationNational Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work
National Cyber Security Awareness Month Week Two: Creating a Culture of Cybersecurity at Work Webinar Recording and Evaluation Survey This webinar is being recorded and will be made available online to
More informationOctober 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
More informationTHE WHITE HOUSE Office of the Press Secretary
FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly
More informationManaging Cyber Attacks
Managing Cyber Attacks Regulators and Industry Participants Discuss Ways to Strengthen Defenses By Joanne Morrison June 25, 2015 Cybersecurity risks and testing are a major concern of regulators and market
More informationMANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
More informationTuesday, June 04, 2013 -- 2013 NYS Cyber Security Conference
About Us Zogby Analytics conducts a wide variety of surveys internationally and nationally in industries, including banking, IT, medical devices, government agencies, colleges and universities, non-profits,
More informationNIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
More informationRecognize Nefarious Cyber Activity and Catch Those Responsible with IBM InfoSphere Entity Analytic Solutions
Building a Smarter Planet with Advanced Cyber Security Solutions Recognize Nefarious Cyber Activity and Catch Those Responsible with Highlights g Cyber Security Solutions from IBM InfoSphere Entity Analytic
More informationTen Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
More informationCyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
More informationAdopting a Cybersecurity Framework for Governance and Risk Management
The American Hospital Association s Center for Healthcare Governance 2015 Fall Symposium Adopting a Cybersecurity Framework for Governance and Risk Management Jim Giordano Vice Chairman & Chair of Finance
More informationCybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission. June 25, 2015
Cybersecurity for Nonprofits: How to Protect Your Organization's Data While Still Fulfilling Your Mission June 25, 2015 1 Your Panelists Kenneth L. Chernof Partner, Litigation, Arnold & Porter LLP Nicholas
More informationCYBER RISK INTERNATIONAL COMPANY PROFILE
CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.
More informationI ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
More informationUS House Energy and Commerce Committee. Commerce, Manufacturing, and Trade Subcommittee
US House Energy and Commerce Committee Commerce, Manufacturing, and Trade Subcommittee Protecting Consumer Information: Can Data Braches Be Prevented? February 5, 2014 Congressmen in Attendance: Rep. Lee
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
More informationAftermath of a Data Breach Study
Aftermath of a Data Breach Study Sponsored by Experian Data Breach Resolution Independently conducted by Ponemon Institute LLC Publication Date: January 2012 Ponemon Institute Research Report Aftermath
More informationCyber Security in the Financial Industry
Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today
More informationGALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability
GALLAGHER CYBER LIABILITY PRACTICE Tailored Solutions for Cyber Liability and Professional Liability Are you exposed to cyber risk? Like nearly every other business, you have probably capitalized on the
More informationCyber-Security Risk in the Global Organization:
Cyber-Security Risk in the Global Organization: Trends, Challenges and Strategies for Effective Management David Childers, CCEP, CIPP CEO, Compli Todd Carroll Assistant Special Agent in Charge, FBI Three
More informationThe Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
More informationPwC Cybersecurity Briefing
www.pwc.com/cybersecurity Cybersecurity Briefing June 25, 2014 The views expressed in these slides are solely the views of the presenters and do not necessarily reflect the views of the PCAOB, the members
More informationExercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
More informationCyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
More informationPanel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices
Panel Title: Data Breaches: Industry and Law Enforcement Perspectives on Best Practices Over the course of this one hour presentation, panelists will cover the following subject areas, providing answers
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Detection, analysis, and understanding of threat
More informationPrepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc.
Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc. Before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the House Committee on
More informationIdentifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
More informationNational Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap
FOR IMMEDIATE RELEASE National Cyber Security Awareness Month Seeks #TalentHack Solutions to Overcome the Cybersecurity Skills Gap Closing the Cyber Talent Gap and Educating the Workforce of the Future
More informationOCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
More informationCyber Security. Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP
Cyber Security Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP Speakers: Keith Overly, Executive Director, Ohio Deferred Compensation Program Raj Patel, Partner, Plante & Moran, PLLC
More informationCYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES. second edition
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES second edition The information provided in this document is presented as a courtesy to be used for informational purposes only.
More informationCyber Liability & Data Breach Insurance Claims
Cyber Liability & Data Breach Insurance Claims A Study of Actual Payouts for Covered Data Breaches Mark Greisiger President NetDiligence June 2011 Last year, privacy breaches ran about 1-2 per week. This
More informationIntroduction to Cybersecurity Overview. October 2014
Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,
More informationTHE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY
THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY BY DR. BRIAN MCELYEA AND DR. EMILY DARRAJ Approved for Public Release: Case # 16-0276 NORTHROP GRUMMAN WHITE PAPER 2016 Northrop Grumman
More informationCYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
More informationDeveloping Secure Software in the Age of Advanced Persistent Threats
Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationSupplier Vigilance: A Critical Layer of Defense
Supplier Vigilance: A Critical Layer of Defense Lockheed Martin Information Security 1 Supply Chain Cyber Security Lockheed Martin October 23, 2013 Debbie Stuckey Waide Jones, CISSP 2 Synopsis Lockheed
More information