УРАГШАА MONGOLIA! FROM SOFTWARE PIRACY TO LICENSE COMPLIANCE. Evgeny DANILOV. Microsoft Central and Eastern Europe Multi-Country New Markets

Size: px
Start display at page:

Download "УРАГШАА MONGOLIA! FROM SOFTWARE PIRACY TO LICENSE COMPLIANCE. Evgeny DANILOV. Microsoft Central and Eastern Europe Multi-Country New Markets"

Transcription

1 УРАГШАА MONGOLIA! FROM SOFTWARE PIRACY TO LICENSE COMPLIANCE Evgeny DANILOV Microsoft Central and Eastern Europe Multi-Country New Markets

2 Embracing the IT Change Stronger IPR Protection

3 What is the Software Piracy? Intentional (users know that they use pirated software) Unauthorized copying and distribution of software Unauthorized installation of software for private and commercial use Non-Intentional (users may not know they are using pirated version of software) Counterfeiting of original products, including packaging Violation of licensing agreements for the software

4 Benefits of Genuine Software Quality Security and Reliability Technical Support Peace of Mind Only genuine software brings all the benefits of modern IT technologies into rich, reliable, scalable and secure digital environment

5 Piracy Is No Gain GOVERNMENTS BUSINESS CONSUMERS Missed IT contribution to GDP Maintenance Costs System Reliability Lost taxes and jobs Data Security Risks Viruses and malware Weak IT ecosystem Legal Risks Loss of data Low international competitiveness Reputational Risks Lack of Technical Support

6 Microsoft s Anti-Piracy Strategy EDUCATION PREVENTION CONVERSION ENFORCEMENT

7 IPR Awareness Campaigns: Serbia Example VAT revenues increase from SW sales Campaign Results 46 entities with legal SW 61 entities with illegal SW Source: Serbian Tax Authorities Report 29 - legalized SW immediately after DM 27 - in process of legalization 4 was prosecuted 1 violation of licensing terms identified Source: Serbian Tax Authorities Report In cooperation with IPR-related Government Agencies, AmCham and BSA IPR trainings for tax inspectors DM campaign to legal entities On-site Tax Inspections Media publications March-May letters sent 107 on-site checks by Tax Authorities 90% conversion rate Substantial VAT return to the budget

8 Meet Microsoft Digital Crimes Unit Focus on creating a safe digital world Disruptive malware, IP crimes, vulnerable population Acting against those who takes profit from digital crimes Using our own technologies Microsoft Azure, Microsoft SQL Server, Microsoft Office365 In close cooperation with Governments and Cyber Security Agencies Computer Emergency Response Teams or/and Centers Cyber Forensics Team tracks the spread of counterfeit software and delivers a visual representation of these data, including locations where the criminal activity is originating from

9 Software Asset Management (SAM) I don t know what we have and I don t want to buy too little and I don t want to buy too much and I heard you have this SAM program and I need your help. Chief Accounting Officer CONTROL. OPTIMIZE. GROW. A way to realize the most value from your IT assets A global industry standard endorsed by Microsoft A combination of methodology, processes, and technology An enabler to grow your business and compete better STRATEGY Give customers a head start on building best practices for software asset management and gaining control over their environment. Help them to avoid mis-licensing and stay out of associated risks. VISION For all customers to have the methodology they need to optimize their software asset management practices in accordance with their respective financial, operating, and regulatory policies or requirements.

10 Software Asset Management (SAM) NEEDED. INSTALLED. LICENSED. Installed Source: Software Asset Management / IT advisory. KPMG, 2011 Installed but unlicensed and not needed Installed and needed but unlicensed Needed Licensed Installed and licensed but not needed Licensed but not needed or installed Needed and licensed but not installed Needed but not licensed or installed SAM Baseline - Perform software inventory - Match actual software installations with licensing agreements - Produce inventory report (MLS) - Analyze gaps and purchase the needed licenses SAM Optimization - Analyze internal policies and procedures of software purchase and distribution - Develop SAM Optimization Plan and Recommendations - Enforce and monitor internal execution

11 Working Together Microsoft works with the Governments and IT Industry across the globe to reduce software piracy, assist in establishing the civilized IT market, and contribute to national economic and social development World-class IPR environment to foster innovations, IT industry development and act against Digital Crimes IPR awareness and legalization campaigns for Government, Businesses, Education and Home Users Software Asset Management infrastructure and know-how to improve license compliance and increase IT investments return

12 Thank you!

Addressing Global Software Piracy

Addressing Global Software Piracy Addressing Global Software Piracy Partnering with Governments, Industry, and Customers to Strengthen Economies, Drive Innovation, and Protect Information Systems 2 addressing global software Piracy For

More information

Software Asset Management Guide

Software Asset Management Guide Software Asset Management Guide WHY MANAGE SOFTWARE ASSETS Introduction IN TODAY'S ECONOMY, software is indispensable to every organization, large and small. Thanks to software, businesses are more efficient

More information

TOP QUESTIONS ABOUT MICROSOFT AUDITS

TOP QUESTIONS ABOUT MICROSOFT AUDITS 20 TOP QUESTIONS ABOUT MICROSOFT AUDITS 1745 Broadway, 17th Floor, New York, NY 10019, USA Tel. 646 475 2103 The word audit scares many people, but if your company licenses software, you will be audited

More information

Software Licensing and Compliance Guide

Software Licensing and Compliance Guide This message has been brought to you by m Software Licensing and Compliance Guide What every business needs to kw about software licensing and compliance. Welcome This guide was developed for businesses

More information

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)

More information

Software Anti-piracy and Pricing in a Competitive Environment: a Game Theoretic Analysis

Software Anti-piracy and Pricing in a Competitive Environment: a Game Theoretic Analysis Software Anti-piracy and Pricing in a Competitive Environment: a Game Theoretic Analysis We study a problem of two software firms competing on price in a market where consumers can choose between purchasing

More information

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime. Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

IP CRIME HIGHLIGHT REPORT 2013/14

IP CRIME HIGHLIGHT REPORT 2013/14 IP CRIME HIGHLIGHT REPORT 2013/14 2 IP CRIME HIGHLIGHT REPORT 2013/14 IP CRIME GROUP The UK IP Crime Group is comprised of representatives from private sector, enforcement agencies and government departments

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years 2009 2013 State of Minnesota Enterprise Security Strategic Plan Fiscal Years 2009 2013 Jointly Prepared By: Office of Enterprise Technology - Enterprise Security Office Members of the Information Security Council

More information

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security Enterprise Security Governance Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security Governance and Organisational Model Risk Mgmt & Reporting Digital Risk & Security

More information

How To Get A License From A Business To A Computer (For A Business)

How To Get A License From A Business To A Computer (For A Business) Six Steps to Completing a Software Audit and Ensuring Compliance While Saving Money A Guide to Assessing Vulnerabilities and Ensuring Ongoing Software License Compliance 200 West Mercer Street Suite E300

More information

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA

Public-Private Partnerships against cybercrime. Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA Public-Private Partnerships against cybercrime Jean-Christophe Le Toquin Director Internet Safety Microsoft EMEA The need for Public Private Partnerships to fight cybercrime Evidence needed by police to

More information

SAM Benefits Overview

SAM Benefits Overview SAM Benefits Overview control. optimize. grow. M Software Asset Management What is SAM? Software Asset Management, often referred to as SAM, is a vital set of continuous business processes that provide

More information

Justifying projects in software license compliance

Justifying projects in software license compliance Justifying projects in software license compliance The role of software license compliance within an organization White paper Introduction... 2 Software license compliance the risk... 2 Sources of software

More information

How to Safeguard Your DMS: FTC Enforces Against Georgia Dealer Because of "P2P" Software Exposed Consumer Data

How to Safeguard Your DMS: FTC Enforces Against Georgia Dealer Because of P2P Software Exposed Consumer Data How to Safeguard Your DMS: FTC Enforces Against Georgia Dealer Because of "P2P" Software Exposed Consumer Data With Erik Nachbahr, President of Helion Technologies Moderated by Mike Bowers, Executive Editor

More information

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT

SAM Benefits Overview SAM SOFTWARE ASSET MANAGEMENT SAM Benefits Overview SAM SAM is critical to managing an IT environment because effectiveness is seriously compromised when an organization doesn t know what software assets it has, where they are located,

More information

Law Firm Cyber Security & Compliance Risks

Law Firm Cyber Security & Compliance Risks ALA WEBINAR Law Firm Cyber Security & Compliance Risks James Harrison CEO, INVISUS Breach Risks & Trends 27.5% increase in breaches in 2014 (ITRC) Over 500 million personal records lost or stolen in 2014

More information

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance

Empirical Analysis of Software Usage to Drive Policy Recommendations. May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Empirical Analysis of Software Usage to Drive Policy Recommendations May 19, 2015 USCD Jared W. Ragland BSA The Software Alliance Outline Introduction to BSA Global Studies and their Methodology 2014 BSA

More information

Internet Acceptable Use and Software Installation Policy

Internet Acceptable Use and Software Installation Policy Internet Acceptable Use and Software Installation Policy Internet access is available to all team members of the Regional Office Education for Bond, Fayette, and Effingham Counties #3 (ROE) and its divisions.

More information

Cyber Risks and Insurance Solutions Malaysia, November 2013

Cyber Risks and Insurance Solutions Malaysia, November 2013 Cyber Risks and Insurance Solutions Malaysia, November 2013 Dynamic but vulnerable IT environment 2 Cyber risks are many and varied Malicious attacks Cyber theft/cyber fraud Cyber terrorism Cyber warfare

More information

Computer Forensics Preparation

Computer Forensics Preparation Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics

More information

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced

More information

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4

State Agency Cyber Security Survey v 3.4 2 October 2014. State Agency Cybersecurity Survey v 3.4 State Agency Cybersecurity Survey v 3.4 The purpose of this survey is to identify your agencies current capabilities with respect to information systems/cyber security and any challenges and/or successes

More information

ISACA Kampala Chapter Feb 2011. Bernard Wanyama Syntech Associates Limited

ISACA Kampala Chapter Feb 2011. Bernard Wanyama Syntech Associates Limited ISACA Kampala Chapter Feb 2011 Bernard Wanyama Syntech Associates Limited Agenda 1. ERP: What is it? 2. ERP: Examples 3. Security: Definitions, Triads & Frameworks 4. Security: Control Framework 5. Traditional

More information

1.Business Advisor Series

1.Business Advisor Series 1.Business Advisor Series Software Asset Management Ensure license compliance, reduce risk, and increase IT saving Foreword There are software licenses for every type of individual and organization from

More information

2.Business Advisor Series

2.Business Advisor Series 2.Business Advisor Series Don t Risk your Business How to ensure your software is licensed What Risks is your business running? In 2007 the Business Software Alliance (BSA) asked independent research house

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

BSA GLOBAL CYBERSECURITY FRAMEWORK

BSA GLOBAL CYBERSECURITY FRAMEWORK 2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access

More information

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100 SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define

More information

Mr José Raúl Mulino Quintero, Minister of Public Security, Panama (Speaker 4);

Mr José Raúl Mulino Quintero, Minister of Public Security, Panama (Speaker 4); OPENING ADDRESS BY MR KHOO BOON HUI PRESIDENT OF INTERPOL 2012 INTERNATIONAL LAW ENFORCEMENT IP CRIME CONFERENCE CO- HOSTED BY INTERPOL AND POLICÍA NACIONAL DE PANAMÁ TO BE HELD AT THE WESTIN PLAYA BONITA

More information

SECURITY. Risk & Compliance Services

SECURITY. Risk & Compliance Services SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize

More information

Software Piracy in the Arab Region

Software Piracy in the Arab Region EGM on Enabling Environment for the Development of Arabic e-services Beirut, 8-9 March 2011 Software Piracy in the Arab Region Status, Impact and the Way Ahead Mansour Farah Consultant on ICT for Development

More information

Resolution on the EU Customs Action Plan to combat intellectual property rights infringements (2013 to 2017)

Resolution on the EU Customs Action Plan to combat intellectual property rights infringements (2013 to 2017) COU CIL OF THE EUROPEA U IO EN Resolution on the EU Customs Action Plan to combat intellectual property rights infringements (2013 to 2017) 3208th COMPETITIVESS (Internal Market, Industry, Research and

More information

Cybersecurity..Is your PE Firm Ready? October 30, 2014

Cybersecurity..Is your PE Firm Ready? October 30, 2014 Cybersecurity..Is your PE Firm Ready? October 30, 2014 The Panel Melinda Scott, Founding Partner, Scott Goldring Eric Feldman, Chief Information Officer, The Riverside Company Joe Campbell, CTO, PEF Services

More information

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Cyber Security Incident Handling Policy Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Oct 9, 2015 i Document Control Document Owner Classification

More information

US Environmental Protection Agency Office of Environmental Information GUIDELINES

US Environmental Protection Agency Office of Environmental Information GUIDELINES US Environmental Protection Agency Office of Environmental Information GUIDELINES for the Software Management and Piracy Policy June 2003 IO 2104-G-01.0 (no former number) Purpose: Audience: The Environmental

More information

Standard Summary Project Fiche IPA centralised programmes. Project Number 08: Enforcement of Intellectual Property Rights

Standard Summary Project Fiche IPA centralised programmes. Project Number 08: Enforcement of Intellectual Property Rights Standard Summary Project Fiche IPA centralised programmes Project Number 08: Enforcement of Intellectual Property Rights 1 BASIC INFORMATION 1.1 CRIS Number 2011/022-585 1.2 Title Enforcement of Intellectual

More information

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY

Business-Facilitati on Steering Group APEC CYBERSECURITY STRATEGY B APEC CYBERSECURITY STRATEGY Doc no: telwg26/ BFSG/22 Agenda item: Business-Facilitati on Steering Group Submitted by: USA delegation APEC CYBERSECURITY STRATEGY Contact: Joseph Richardson Email: richardsonjp@state.gov

More information

STATE OF CYBER SECURITY IN ETHIOPIA

STATE OF CYBER SECURITY IN ETHIOPIA ETIOPIAN TELECOMMUNICATIONS AGENCY STATE OF CYBER SECURITY IN ETHIOPIA By Mr. Balcha Reba Ethiopian Telecommunications Agency Standards and Inspection Department Head, Standards Division email: tele.agency@ethionet.et

More information

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan WHITE PAPER Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan Introduction to Data Privacy Today, organizations face a heightened threat landscape with data

More information

Cybersecurity and internal audit. August 15, 2014

Cybersecurity and internal audit. August 15, 2014 Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

IT Security Incident Management Policies and Practices

IT Security Incident Management Policies and Practices IT Security Incident Management Policies and Practices Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology Date: Feb 6, 2015 i Document Control Document

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Policies and Practices on Network Security of MIIT

Policies and Practices on Network Security of MIIT 2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and

More information

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe 2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information

More information

4.0 ISSUANCE OF REGULATIONS/STANDARD OPERATING PROCEDURES

4.0 ISSUANCE OF REGULATIONS/STANDARD OPERATING PROCEDURES Policy: 13.09 SUBJECT: SOFTWARE USAGE Supersedes: 2001-2002 DPS Policy Manual, No. 10.10 Computer Hardware/Software and Office Equipment Use, dated July 14, 2000 Effective: February 15, 2005 Page: 1 of

More information

The South African Constitution provides that every citizen has the right to choose his trade, occupation or profession freely

The South African Constitution provides that every citizen has the right to choose his trade, occupation or profession freely A Perspective on the Effect and Impact of the Phenomenon of Counterfeiting on the South African Economy Presented by Adv Tommy Prins SC Partner: Forensic & Dispute Services Johannesburg, South Africa Introduction

More information

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time. 2 Barry Brueseke (619) 401 7334 www.inetwork west.com 4/3/2014 IEEE Cyber Security Workshop

More information

WEB APPLICATION FIREWALLS: DO WE NEED THEM?

WEB APPLICATION FIREWALLS: DO WE NEED THEM? DISTRIBUTING EMERGING TECHNOLOGIES, REGION-WIDE WEB APPLICATION FIREWALLS: DO WE NEED THEM? SHAIKH SURMED Sr. Solutions Engineer info@fvc.com www.fvc.com HAVE YOU BEEN HACKED????? WHAT IS THE PROBLEM?

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION Performance Goal 2.4.1 By September 30, 2017, achieve key milestones to promote arms control and nonproliferation by implementing the President s Prague Agenda of steps toward a world without nuclear weapons;

More information

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which

WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which WHY SHOULDN T YOU UPLOAD COPYRIGHTED MEDIA? BECAUSE YOU RISK: breaking the law downloading a serious computer virus sharing your personal data, which can lead to identity theft getting exposed to pornographic

More information

Privacy in the Cloud A Microsoft Perspective

Privacy in the Cloud A Microsoft Perspective A Microsoft Perspective November 2010 The information contained in this document represents the current view of Microsoft Corp. on the issues discussed as of the date of publication. Because Microsoft

More information

Software Asset Management: Risk and Reward. March 2015

Software Asset Management: Risk and Reward. March 2015 Software Asset Management: Risk and Reward March 2015 Agenda What Are the Risks Direct Risks Indirect Risks Future Risks How to Assess the Risks Maturity Frameworks Compliance Assessments Mitigating the

More information

National Cyber Crime Unit

National Cyber Crime Unit National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme Kevin.Williams@nca.x.gsi.gov.uk Official Problem or opportunity Office for National Statistics In

More information

Addressing the Global Supply Chain Threat Challenge Huawei, a Case Study

Addressing the Global Supply Chain Threat Challenge Huawei, a Case Study SESSION ID: ECO-W02 Addressing the Global Supply Chain Threat Challenge Huawei, a Case Study Andy Purdy Chief Security Officer Huawei Technologies USA Huawei is a global organization serving over a third

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Information Security Policy

Information Security Policy Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Microsoft OEM System Builder. Licensing Guide

Microsoft OEM System Builder. Licensing Guide Microsoft OEM System Builder Licensing Guide This guide will provide you, the OEM System Builder, with the information you ll need to successfully understand and manage Microsoft System Builder software

More information

Do not forget the basics!!!!!

Do not forget the basics!!!!! Do not forget the basics!!!!! Domenico Raguseo IBM Europe Security Systems Technical Sales Manager Attackers are relentless, victims are targeted, and the damage toll is rising We are in an era of continuous

More information

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial

More information

Microsoft Licensing made simple

Microsoft Licensing made simple Accelerating Your Success Microsoft Licensing made simple Avnet Technology Solutions recommends genuine Microsoft software Software Contents Microsoft Licensing made simple... 4 OEM Licensing... 5 OEM

More information

Gregg Gerber. Strategic Engagement, Emerging Markets

Gregg Gerber. Strategic Engagement, Emerging Markets Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005

More information

region16.net Acceptable Use Policy ( AUP )

region16.net Acceptable Use Policy ( AUP ) region16.net Acceptable Use Policy ( AUP ) Introduction By using service(s) provided by region16.net (including, but not necessarily limited to, Internet Services and videoconferencing), you agree to comply

More information

IACC 2016 Spring Conference. In partnership with: ICC BASCAP

IACC 2016 Spring Conference. In partnership with: ICC BASCAP IACC 2016 Spring Conference In partnership with: ICC BASCAP May 18-20, 2016 Orlando, Florida Securing the Global Supply Chain from Counterfeiting and Piracy Rights holders and intermediaries working together

More information

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer

More information

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia jason.lawrence@ey.com Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing

More information

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and

More information

THE INFORMATION TECHNOLOGY INFRASTRUCTURE

THE INFORMATION TECHNOLOGY INFRASTRUCTURE Department of Health and Human Services OFFICE OF INSPECTOR GENERAL THE INFORMATION TECHNOLOGY INFRASTRUCTURE AND OPERATIONS OFFICE HAD INADEQUATE INFORMATION SECURITY CONTROLS Inquires about this report

More information

Effective Methods to Detect Current Security Threats

Effective Methods to Detect Current Security Threats terreactive AG. Swiss Cyber Storm 2015. Effective Methods to Detect Current Security Threats Enrico Petrov Director Managed Security Services terreactive October 21 st, 2015 terreactive Background. About

More information

zoomlens January 2012 Why General Counsel should care about Software Asset Management

zoomlens January 2012 Why General Counsel should care about Software Asset Management zoomlens January 2012 Why General Counsel should care about Software Asset Management An organization s ability to maintain compliance with its contractual obligations and manage costs depends on whether

More information

DHS Homeland Security Science & Technology Advisory Committee (HSSTAC)

DHS Homeland Security Science & Technology Advisory Committee (HSSTAC) DHS Homeland Security Science & Technology Advisory Committee (HSSTAC) ICE Projects and Program Overview April 2014 August 19, 2010 Directorates Homeland Security Investigations Enforcement and Removal

More information

Microsoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC)

Microsoft Security Response Center (MSRC) Microsoft Malware Protection Center (MMPC) Security@Microsoft Trustworthy Computing (TwC) Programs supporting security outreach and engagement Microsoft Active Protections Program (MAPP), Government Security Program (GSP) (was SCP) Microsoft Security

More information

Answer: C. Answer: C. Answer: B

Answer: C. Answer: C. Answer: B Question: 1 You are a Software Asset Management (SAM) consultant for Company.com. The company has grown through acquisition for several years. The company does not use a common method for software license

More information

How to protect yourself. against piracy

How to protect yourself. against piracy How to protect yourself against piracy Dear reader, Technology is at the heart of many homes and small businesses. Buying genuine, licensed Microsoft software lets you safeguard your system, so you can

More information

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008 Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities

More information

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already

More information

www.pwc.com/us/cyber Statement of Qualifications Cybercrime & data breach

www.pwc.com/us/cyber Statement of Qualifications Cybercrime & data breach www.pwc.com/us/cyber Statement of Qualifications Cybercrime & data breach Contents Countering cyber threats and fraud Cyber forensics and investigative services Cyber forensics and investigations Past

More information

VENDOR MANAGEMENT. General Overview

VENDOR MANAGEMENT. General Overview VENDOR MANAGEMENT General Overview With many organizations outsourcing services to other third-party entities, the issue of vendor management has become a noted topic in today s business world. Vendor

More information

Cyber Risk Management

Cyber Risk Management Cyber Risk Management A short guide to best practice Insight October 2014 So what exactly is 'cyber risk'? In essence, cyber risk means the risk connected to online activity and internet trading but also

More information

IBM QRadar Security Intelligence April 2013

IBM QRadar Security Intelligence April 2013 IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

GEARS Cyber-Security Services

GEARS Cyber-Security Services Florida Department of Management Services Division of State Purchasing Table of Contents Introduction... 1 About GEARS... 2 1. Pre-Incident Services... 3 1.1 Incident Response Agreements... 3 1.2 Assessments

More information

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org Some Perspectives On Cybersecurity Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org Agenda What is the Internet Society (ISOC) On the IETF Cyber Security Themes

More information

2012 Bit9 Cyber Security Research Report

2012 Bit9 Cyber Security Research Report 2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by

More information

Federal Bureau of Investigation s Integrity and Compliance Program

Federal Bureau of Investigation s Integrity and Compliance Program Evaluation and Inspection Division Federal Bureau of Investigation s Integrity and Compliance Program November 2011 I-2012-001 EXECUTIVE DIGEST In June 2007, the Federal Bureau of Investigation (FBI) established

More information

Chapter 15: Computer Security and Privacy

Chapter 15: Computer Security and Privacy Understanding Computers Today and Tomorrow 12 th Edition Chapter 15: Computer Security and Privacy Learning Objectives Explain why all computer users should be concerned about computer security. List some

More information

NIST Cyber Security Activities

NIST Cyber Security Activities NIST Cyber Security Activities Dr. Alicia Clay Deputy Chief, Computer Security Division NIST Information Technology Laboratory U.S. Department of Commerce September 29, 2004 1 Computer Security Division

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

<Insert Picture Here> François Lorthioir mobile : +33 6 76 92 81 35 Manager Eastern Europe, Middle East and Africa.

<Insert Picture Here> François Lorthioir mobile : +33 6 76 92 81 35 Manager Eastern Europe, Middle East and Africa. François Lorthioir mobile : +33 6 76 92 81 35 Manager Eastern Europe, Middle East and Africa BG OUG - Oct 2008 LMS @ BG OUG This Session Compliance, Software Asset Management and

More information

Effective Methods to Detect Current Security Threats

Effective Methods to Detect Current Security Threats terreactive AG. Swiss Cyber Storm 2015. Effective Methods to Detect Current Security Threats Taking your IT security to the next level, you have to consider a paradigm shift. In the past companies mostly

More information

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e

Taking a Proactive Approach to Patch Management. B e s t P r a c t i c e s G u i d e B e s t P r a c t i c e s G u i d e It s a fact of business today: because of the economy, most organizations are asking everyone, including the IT staff, to do more with less. But tight budgets and the

More information

SAM Starter Kit: A fast track guide to. Software Asset Management

SAM Starter Kit: A fast track guide to. Software Asset Management SAM Starter Kit: A fast track guide to Software Asset Management 2 Legal You must not publish, sell, distribute or reproduce this book or any part of the starter kit without permission of the author. You

More information