Seminar Conduct and Protocol Nicholas Witchell, for Payments UK. Welcome Maurice Cleaves, Payments UK
|
|
- Dylan Collins
- 8 years ago
- Views:
Transcription
1 DAY TWO WEDNESDAY 28 OCTOBER (MORNING SESSION) AGENDA DAY ONE TUESDAY 27 OCTOBER 8.00 Event Registration 8.50 Seminar Conduct and Protocol Nicholas Witchell, for Payments UK All briefings and comments made within the presentation hall are delivered in accordance and requirement for strict adherence to 2002 revised Chatham House rule. Notably: participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed There will be no external media presence within the presentation hall. All event interviews will be conducted in the networking area or exhibitor village, by mutual consent only. Welcome Maurice Cleaves, Payments UK The Payments UK Chief Executive will welcome delegates to the event and provide an overview of the role and remit of Payments UK Keynote: Ducks, Rabbits & Mr Men Craig Rice, Payments UK In the tradition of this event, of offering analysis and assessment rather than narrative, the Director of Security for Payments UK will offer a view of: Key trend analysis within cyber security for banking and payments Outline Payments UK s contribution to tackling the challenges rather than simply admiring the problem Consider some of the strategic issues and corresponding capabilities that may become evident in the near and medium term Spotlight: Financial Fraud Action UK Katy Worobec, FFA UK The Director of Financial Fraud Action UK (FFA UK) will provide an overview of: The role and operations of the newly incorporated FFA UK within the banking and payments ecosystem Future strategy and capability development Key relationships with governance and law enforcement Presentation: Shining Light Into Dark Places Leigh Chase, IBM The Competency Leader for Security Intelligence at IBM Security UK & Ireland, will share his insights on how IBM takes on Security Intelligence at scale and some of the major problems faced as an intelligence-processing organisation. These include data volume, techniques for reduction, the role of analytic technologies and an approach to event correlation in complex data sets. With the increase in the availability, acquisition and deployment of crime-packs and related malicious software, we need to better understand how these suites share and proliferate techniques using hidden services and Dark Web networks. This session will show how this is a very active area of investigation across IBM and Leigh Chase will introduce techniques applied, from research through to production and deployment.
2 DAY ONE TWO TUESDAY WEDNESDAY 27 OCTOBER 28 OCTOBER (MORNING SESSION) Spotlight : Finance Strategy Co-ordination Group Phil Westgarth, VocaLink The Chair of Finance Strategy Co-ordination Group will explain how the Bank of England have initiated a review of the information sharing landscape across the Financial Sector through their creation of the Cyber Co-ordination Group to assist with the cohesion of the multitude of organically grown information sharing bodies that currently exist Break & Networking Presentation: Cyber Resilience People, Process and Technology George Quigley, KPMG The Partner, in KPMG s Financial Services Cyber Security business will explain how cyber risk changes the way that financial services organisations need to consider cyber. This session will cover relevant aspects of cyber resilience, including how firms should interpret and respond to the latest guidance being provided by the Bank of England Spotlight: Financial Services Information Exchange Dr David Aubrey-Jones Information exchanges have been established to promote the cascade of knowledge and key lessons identified in all Tier 1 sectors in UK industry and commerce. This spotlight presentation will outline the work of the Financial Services Information Exchange Panel: Convergence A panel including Iain Swaine (Ensequrity); Leigh Chase (IBM) and Alex Grant (Barclays) will consider: What are the areas of synergy between Fraud and Cyber Security? What can they learn from each other? How can they be combined to develop a more effective team? Spotlight: Centre for the Protection of National Infrastructure CPNI will outline the support and services they provide to industry and commerce. The briefing will also consider their perspective of cyber threat to financial services in the UK Lunch & Networking
3 DAY ONE TWO TUESDAY WEDNESDAY 27 OCTOBER 28 OCTOBER (MORNING SESSION) Presentation: The World after Slavik - How Others have Improved on the Business Club s Tricks Maurits Lucas, Fox-IT The Business Manager for intell, the Cyber Intelligence team at FoxIT will explore how Slavik and his Business Club have changed the ecrime world. Criminals have discovered new crime ware tools, while former Business Club affiliates have created their own. This session will outline how the threat landscape has evolved and how the criminals have changed their business models Spotlight: Cyber Defence Alliance David Sheridan, Santander The Cyber Defence Alliance has been billed as a NATO of banks who have pooled resources and made a commitment for greater integration with law enforcement. These efforts are designed to provide participants with greater shared situational awareness of cyber threats than could be achieved by any bank on their own. This spotlight presentation will highlight what has been achieved thus far and what ambitions lay ahead for this innovative concept capability demonstrator Presentation: Utilising Behaviour Analytics for Combating Cyber Fraud Boaz Krelbaum, Bottomline Technologies The General Manager of Cyber Fraud & Risk Management and Bottomline Technologies will explain how Fraud exists across payment types. Explore how payment compromise can occur at different points in the various payment processes, by external criminals, by internal employees or by external criminals posing as employees. This session will present a comprehensive approach which includes user behaviour analytics to mitigate the risk and become prepared to the unknown Spotlight: Cyber Attack against Payment Processes Ralph Smith, FS-ISAC Financial Services Information Sharing and Analysis Centre (FS ISAC) has over a decade of experience running Cyber Defence Exercises (CDXs), for financial organisations in the US and Canada. This September, in conjunction with Payments UK, it delivered the first European focussed iteration of its long running Cyber Attack against Payment Processes exercise. This spotlight session will outline how the CDX was delivered and what initial lessons identified have been derived from it Break & Networking Presentation: There s a RAT in your Browser - when Fraud and Cyber Converge Uri Rivner, BioCatch The Head of Cyber Strategy at BioCatch will present how over the last five years, there has been an increase of state-sponsored attacks focused on theft of intellectual property across globe. The common thread in these attacks; the use of RATs (Remote Administration Tools). In most Advanced Persistent Threats, the initial compromise happens when an employee has been socially engineered to open a file that included a zero-day attack or has clicked on a link that has led to an infection point. A RAT is downloaded onto their computer, allowing full remote access into the device, which is already connected to the network. This session will present how the same methodology is now being used by cybercriminals to conduct online banking fraud.
4 DAY TWO ONE TUESDAY WEDNESDAY 27 OCTOBER 28 OCTOBER (MORNING SESSION) Panel: Cyber Resilience A panel including George Quigley (KPMG); Mick Paisley (VocaLink); and Chris Gibson (CERT-UK) will consider: What does cyber resilience mean to individual institutions and the eco-system? What new ways and means will need to be implemented to achieve this? What wider engagement and liaison in the banking and payments eco-system is necessary to achieve this in hardware, software and operating systems? Wrap Up Craig Rice, Payments UK Seminar Summary covering salient points and key conclusions Prize Draw Nicholas Witchell The Seminar Chair will conduct the Prize Draw and close the formal proceedings Networking Drinks Register Visit the Payments UK website to register your attendance for the 2015 Cyber Security and Fraud Seminar. REGISTER >>
5 DAY TWO WEDNESDAY 28 OCTOBER (MORNING SESSION) 8.00 Event Registration for Morning Briefings 8.50 Seminar Conduct and Protocol Nicholas Witchell, for Payments UK All briefings and comments made within the presentation hall are delivered in accordance and requirement for strict adherence to 2002 revised Chatham House rule. Notably: participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed There will be no external media presence within the presentation hall. All event interviews will be conducted in the networking area or exhibitor village, by mutual consent only. Welcome Maurice Cleaves, Payments UK The Payments UK CEO will welcome delegates to the event and provide an overview of the role and remit of Payments UK Keynote: Babelfish & Acronym Spaghetti Craig Rice, Payments UK The Payments UK Director of Security will offer some accessible models and concepts that help cut through the jargon and make sense of a complex threat environment Spotlight: Financial Fraud Action UK Katy Worobec, FFA UK The Director of Financial Fraud Action UK (FFA UK) will provide an overview of: The role and operations of the newly incorporated FFA UK within the banking and payments ecosystem Future strategy and capability development Key relationships with governance and law enforcement Presentation Changing Landscapes Emerging Challenges Mark Waghorne, KPMG The Head of I-4 ( in KPMG s Cyber Security business will explore whether we are beginning to see signs of shifts in the cyber security threat landscape as organised crime look for new routes to financial advantage. Have we been successful in raising the cost of doing business for those criminals? This session will explore whether this really reduced our risk and just what might these shifts mean for us as security and fraud control professionals in the coming years Presentation: Learning from Others Cyber Mistakes Alexander Forbes, IBM The Security Consultant, EMEA ERS Team Leader and Malware Analyst at IBM will share his experience in dealing with real cyber attacks and actual security tests and what you can learn from the misfortune and mistakes of others. This will assist you in putting in place solutions to help avoid similar situations in your own organisation. This session will discuss social-engineering, hacking, malware (including Advanced Persistent Threats) and the Dark Web!
6 DAY TWO WEDNESDAY 28 OCTOBER (MORNING SESSION) Break & Networking Presentation: The Evolution of the Criminal Business Models forces a Paradigm Shift Maurits Lucas, Fox-IT The Business Manager for intell, the Cyber Intelligence team at FoxIT will discuss how criminal business models have evolved and how traditional mitigation models have difficulty with the manual processes of criminal operators. This session will outline how contextual feeds can form a first line of defence, while real-time event analytics provides the power to detect banking malware such as Dyre & Dridex Presentation: Behaviour - A New Domain in Cyber Resilience Uri Rivner, BioCatch The Head of Cyber Strategy at BioCatch will explore how advanced state-sponsored attacks and financially motivated cybercrime has located the weakest link: people and compromised access credentials. This is why the introduction of a new domain in security, the Behavioural Domain, is timely. In this case study, we ll see how global online and mobile banking users behave, and what happens when fraudsters enter their account. We ll see how different people behave differently, but also consistently, so a baseline of their regular behaviour, preferences, habits and choices can be determined. We ll also identify non-human behaviour and remotely controlled behaviour. This session will also explore what happens when someone opens a new account, and see the behavioural difference between honest, legitimate applicants and professional criminals Presentation: Perimeter Security is not Enough - Monitoring Insider Behaviour to catch Intruders Boaz Krelbaum, Bottomline Technologies The General Manager of Cyber Fraud & Risk Management at Bottomline Technologies will discuss how cybercrime is rising at an alarming rate. In the 2014 Cost of Cyber Crime study by Ponemon Institute, 56 U.S. companies reported an average of $12.7 million in losses due to cybercrime, an increase of over 9% from the previous year. Last February, Kaspersky revealed that an international criminal syndicate was able to successfully impersonate bank officers at over 100 banks around the world to net as much as $900 million in stolen funds. While many organisations today maintain a perimeter-centric defence strategy for protecting their most valuable assets, evidently this approach is not good enough. This session will present a method for preventing intrusions by monitoring, profiling and analysing employee user behaviour Spotlight: A View from Threadneedle Street William Brandon, Bank of England The Chief Information Security Officer of the Bank of England will provide an overview of the Bank s perspective on the cyber threat spectrum and the cyber security initiatives that have been introduced to contend with the new threat vectors and actors emerging against Financial Services in the UK Lunch & Networking
7 DAY TWO WEDNESDAY 28 OCTOBER (AFTERNOON (MORNING SESSION) Registration for Afternoon Briefings, Exhibition, Lunch and Networking Seminar Conduct and Protocol Nicholas Witchell, for Payments UK All briefings and comments made within the presentation hall are delivered in accordance and requirement for strict adherence to 2002 revised Chatham House rule. Notably: participants are free to use the information received, but neither the identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed There will be no external media presence within the presentation hall. All event interviews will be conducted in the networking area or exhibitor village, by mutual consent only. Welcome Maurice Cleaves, Payments UK The Payments UK CEO will welcome delegates to the event and provide an overview of the role and remit of Payments UK Keynote: Babelfish & Acronym Spaghetti Craig Rice, Payments UK The Payments UK Director of Security will offer some accessible models and concepts that help cut through the jargon and make sense of a complex threat environment Spotlight: A View from Threadneedle Street Will Brandon, Bank of England The Chief Information Security Officer of the Bank of England will provide an overview of the Bank s perspective on the cyber threat spectrum and the cyber security initiatives that have been introduced to contend with the new threat vectors and actors emerging against Financial Services in the UK Presentation Changing Landscapes Emerging Challenges Mark Waghorne, KPMG The Head of I-4 ( in KPMG s Cyber Security business will explore whether we are beginning to see signs of shifts in the cyber security threat landscape as organised crime look for new routes to financial advantage. Have we been successful in raising the cost of doing business for those criminals? This session will explore whether this really reduced our risk and just what might these shifts mean for us as security and fraud control professionals in the coming years Presentation: Learning from Others Cyber Mistakes Alexander Forbes, IBM The Security Consultant, EMEA ERS Team Leader and Malware Analyst at IBM will share his experience in dealing with real cyber attacks and actual security tests and what you can learn from the misfortune and mistakes of others. This will assist you in putting in place solutions to help avoid similar situations in your own organisation. This session will discuss social-engineering, hacking, malware (including Advanced Persistent Threats) and the Dark Web!
8 DAY TWO WEDNESDAY 28 OCTOBER (AFTERNOON (MORNING SESSION) Spotlight: Financial Fraud Action UK Katy Worobec, FFA UK The Director of Financial Fraud Action UK (FFA UK) will provide an overview of: The role and operations of the newly incorporated FFA UK within the banking and payments ecosystem Future strategy and capability development Key relationships with governance and law enforcement Break & Networking Presentation: The Evolution of the Criminal Business Models forces a Paradigm Shift Maurits Lucas, Fox-IT The Business Manager for intell, the Cyber Intelligence team at FoxIT will discuss that criminal business models have evolved and traditional mitigation models have difficulty with the manual processes of criminal operators. This session will outline how contextual feeds can form a first line of defence, while real-time event analytics provides the power to detect banking malware such as Dyre & Dridex Presentation: Behaviour - A New Domain in Cyber Resilience Uri Rivner, BioCatch The Head of Cyber Strategy at BioCatch will explore how advanced state-sponsored attacks and financially motivated cybercrime has located the weakest link: people and compromised access credentials. This is why the introduction of a new domain in security, the Behavioural Domain, is timely. In this case study, we ll see how global online and mobile banking users behave, and what happens when fraudsters enter their account. We ll see how different people behave differently, but also consistently, so a baseline of their regular behaviour, preferences, habits and choices can be determined. We ll also identify non-human behaviour and remotely controlled behaviour. This session will also explore what happens when someone opens a new account, and see the behavioural difference between honest, legitimate applicants and professional criminals Presentation: Reducing Payment Fraud Risks Taking the Holistic Approach Boaz Krelbaum, Bottomline Technologies The General Manager of Cyber Fraud & Risk Management at Bottomline Technologies will discuss how managing payments, fraud and security risks remain a top priority for companies of all sizes. According to the 2015 Association for Financial Professionals Payments Fraud and Control Survey, 62% of companies were targets of payments fraud in As fraudsters are becoming better organised and more sophisticated in manipulating various payment channels, silo solutions for detecting fraud are no longer effective. This session will present the holistic approach that organisations must take today for handling payment fraud risks effectively Networking Drinks Register Visit the Payments UK website to register your attendance for the 2015 Cyber Security and Fraud Seminar. REGISTER >>
TRANSATLANTIC CYBER SECURITY SUMMIT
TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:
More informationCYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
More informationKeynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.
Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part
More informationDeception scams drive increase in financial fraud
ADDRESS 2 Thomas More Square London E1W 1YN WEBSITE www.financialfraudaction.org.uk DIRECT LINE 020 3217 8436 NEWS RELEASE EMAIL press@ukcards-ffauk.org.uk Deception scams drive increase in financial fraud
More informationCourse 4202: Fraud Awareness and Cyber Security Workshop (3 days)
Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an
More informationZak Khan Director, Advanced Cyber Defence
Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts
More informationASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
More informationBioCatch Fraud Detection CHECKLIST. 6 Use Cases Solved with Behavioral Biometrics Technology
BioCatch Fraud Detection CHECKLIST 6 Use Cases Solved with Behavioral Biometrics Technology 1 2 MAN-IN-THE- BROWSER MALWARE ATTACK DETECTION (E.G. DYRE, NEVERQUEST) REMOTE ACCESS (RAT) DETECTION Challenge:
More informationCYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
More informationFighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
More informationCyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
More informationCSM-ACE 2014 Cyber Threat Intelligence Driven Environments
CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1 CONTENTS Digital criminality Intelligence-led security Shylock case study Making
More informationHow To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
More informationCyber Security in the Financial Industry
Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today
More informationPROMOTION // TECHNOLOGY. The Economics Of Cyber Security
PROMOTION // TECHNOLOGY The Economics Of Cyber Security Written by Peter Mills Malicious cyber activity, from hacking and identity fraud to intellectual property theft, is a growing problem within the
More informationCYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading
CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical
More informationTop 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath
ebook Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath Protecting against downstream fraud attacks in the wake of large-scale security breaches. Digital companies can no longer trust static login
More informationNine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity
Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationDevelopments in cybercrime and cybersecurity
Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their
More informationCloud and Critical Infrastructures how Cloud services are factored in from a risk perspective
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security
More informationCyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
More informationResearch Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
More informationOCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
More informationCyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
More informationMalware isn t The only Threat on Your Endpoints
Malware isn t The only Threat on Your Endpoints Key Themes The cyber-threat landscape has Overview Cybersecurity has gained a much higher profile over the changed, and so have the past few years, thanks
More informationWAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
More informationTLP WHITE. Denial of service attacks: what you need to know
Denial of service attacks: what you need to know Contents Introduction... 2 What is DOS and how does it work?... 2 DDOS... 4 Why are they used?... 5 Take action... 6 Firewalls, antivirus and updates...
More informationWelcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc
Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software
More information2012 Bit9 Cyber Security Research Report
2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by
More informationCyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationBio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
More informationRETHINKING CYBER SECURITY
RETHINKING CYBER SECURITY Introduction Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time, the traditional cyber security vendor
More informationRETHINKING CYBER SECURITY
RETHINKING CYBER SECURITY CHANGING THE BUSINESS CONVERSATION INTRODUCTION Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time,
More informationCombatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
More informationHow To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
More informationExecutive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
More informationAdvanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
More informationAddressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
More informationIBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
More informationSession 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
More informationCYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
More informationA NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
More informationTop 5 Global Bank Selects Resolution1 for Cyber Incident Response.
MAJOR FINANCIAL SERVICES LEADER Top 5 Global Bank Selects Resolution1 for Cyber Incident Response. Automation and remote endpoint remediation reduce incident response (IR) times from 10 days to 5 hours.
More informationA COMPLETE APPROACH TO SECURITY
A COMPLETE APPROACH TO SECURITY HOW TO ACHEIVE AGILE SECURITY OPERATIONS THREAT WATCH Cyber threats cost the UK economy 27 billion a year 200,000 new threats are identified every day 58% of businesses
More informationNew challenges in Data privacy.
New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013
More informationCan We Become Resilient to Cyber Attacks?
Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,
More informationCisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
More informationPractical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
More informationWRITTEN TESTIMONY BEFORE THE HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM
WRITTEN TESTIMONY BEFORE THE SENATE COMMITTEE ON COMMERCE, SCIENCE, & TRANSPORTATION HEARING ON PROTECTING PERSONAL CONSUMER INFORMATION FROM CYBER ATTACKS AND DATA BREACHES MARCH 26, 2014 2:30 PM TESTIMONY
More informationGladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT
Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection INFORMATION SECURITY & RISK MANAGEMENT Gladiator NetTeller Enterprise Security Monitoring Online Fraud Detection Foreword The consumerization
More informationThe Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
More informationCan Your Organization Brave The New World of Advanced Cyber Attacks?
Can Your Organization Brave The New World of Advanced Cyber Attacks? www.websense.com/apx Overview: When it comes to defending against cyber attacks, the global business community faces a dangerous new
More informationTOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
More informationWEB PROTECTION. Features SECURITY OF INFORMATION TECHNOLOGIES
WEB PROTECTION Features SECURITY OF INFORMATION TECHNOLOGIES The web today has become an indispensable tool for running a business, and is as such a favorite attack vector for hackers. Injecting malicious
More informationOctober 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
More informationScott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.
Juniper Networks Next Generation Security for a Cybercrime World Lior Cohen Principal Solutions Architect Scott Lucas Director of Product Marketing, Branch Solutions Service Layer Technologies Business
More informationWho s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
More informationCyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
More informationNational Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In
More informationBig 4 Information Security Forum
San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL
More informationWHITEPAPER. Recall Cyber Intelligence
WHITEPAPER Recall Cyber Intelligence Table of Contents isolv Technologies Solves Employee Insider Threats 3 Case Study 3 The Threat 3 The Challenges 4 isolv s Solution: Recall Cyber Intelligence 4 The
More informationCyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
More informationSeptember 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
More informationManaging Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
More informationSpear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
More informationI D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
More informationAddressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
More informationSymantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationCYBERCRIME AND THE INTERNET OF THREATS. www.juniperresearch.com
CYBERCRIME AND THE INTERNET OF THREATS www.juniperresearch.com 1 1.1 Introduction As more and more business infrastructure moves online, so do those wishing to destroy or defraud that infrastructure. Cybercrime
More informationSecurity Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
More informationReducing cyber risk in the legal sector The blurred boundaries of trust
Reducing cyber risk in the legal sector The blurred boundaries of trust How legal firms can adopt best practice through the adoption of security intelligence tools. Authors: Mark Baker and Tom Salmon Contributor:
More informationGaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
More informationProactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID
Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation By Marc Ostryniec, vice president, CSID The increase in volume, severity, publicity and fallout of recent data breaches
More informationSECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
More informationContent Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
More informationSymantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
More informationOne Minute in Cyber Security
Next Presentation begins at 15:30 One Minute in Cyber Security Simon Bryden Overview Overview of threat landscape Current trends Challenges facing security vendors Focus on malware analysis The year? The
More informationCyber threat intelligence and the lessons from law enforcement. kpmg.com.au
Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations
More informationMarble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
More informationApplying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
More informationCollateral Effects of Cyberwar
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
More informationTargeting the problem together
18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part
More informationBig Data Analytics in Network Security: Computational Automation of Security Professionals
February 13, 2015 Big Data Analytics in Network Security: Computational Automation of Security Professionals Stratecast Analysis by Frank Dickson Stratecast Perspectives & Insight for Executives (SPIE)
More informationEY Cyber Security Hacktics Center of Excellence
EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find
More informationWHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
More informationThreat analytics solution
Threat analytics solution Comprehensive protection against all cyber threats Why do so many companies still find themselves the victims of successful cyber attacks, in spite of all the layers of protection
More informationSIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS
SIMULATED ATTACKS Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru Technical safeguards like firewalls, antivirus software, and email filters are critical for defending your infrastructure,
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationSecurity for the Cloud of Clouds
Security for the Cloud of Clouds Ramy Houssaini. Vice President, BT Security Europe. RamyHoussaini strategicleadership About BT Security BT s end to end Security portfolio integrates classic perimeter
More informationStay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
More informationThe Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
More informationAnalyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
More informationAT A HEARING ENTITLED THREATS TO THE HOMELAND
STATEMENT OF JAMES B. COMEY DIRECTOR FEDERAL BUREAU OF INVESTIGATION BEFORE THE COMMITTEE ON HOMELAND SECURITY AND GOVERNMENTAL AFFAIRS UNITED STATES SENATE AT A HEARING ENTITLED THREATS TO THE HOMELAND
More informationUnknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
More informationBuilding Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch
Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
More informationPreparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
More informationFraud Threat Intelligence
About ERM About The Speaker Safe Browsing, Monitoring Services Product Manager, Easy Solutions Inc. 8+ years anti-fraud, fraud risk, and security intelligence programs Previously licensed Securities Principle
More information