CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015"

Transcription

1 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On October 2015 Lowlands Solutions Netherlands (LSN) will be presenting a fiveday course on Cyber Security, Intelligence and Awareness at the Park Hotel in The Hague, Netherlands. This five day hands-on program will provide the attendee with a comprehensive overview and understanding of the most current and pressing issues in the cyber domain. An encompassing overview of cyber will be given addressing cybercrime, hacktivism, cyber war, cyber espionage and intelligence. This course will not only create awareness of the risks and threats out there, but also equip you with an understanding of how the cyber domain works. This understanding will allow you to recognize and analyze these issues in your own organization. The cyber intelligence cycle and the cyber kill chain, are examples of many tools that will be used and help dissect and illustrate attacks. A broad comprehension of the most pressing issues and current events will be enhanced by the usage of examples of cyber offenses and the analysis thereof. The combination of getting a basic understanding of how the cyber domain works, learning to analyze risks and threats, against the backdrop of case studies and analysis of current issues and events in the cyber domain, will ensure awareness and a professional understanding that equips you to recognize future threats. WHO SHOULD ATTEND? Law Enforcement Personnel, (Military) Intelligence Officers, Security Officers, General Police Officers, Police Officers assigned to Anti-Terrorism activities, Intelligence Analysts, Financial Intelligence Officers, Academics, Security Managers, Protective Service Agents, Investigators, Threat Assessment Professionals and Corporate Managers and or CEOs. LEARNING OBJECTIVES Students attending the Cyber Security, Intelligence and Awareness Course will acquire the following skills and competencies: General knowledge of and familiarization with cyber concepts and attack forms Understanding the global threat landscape and actors Knowledge about strategic, tactical and operational cyber intelligence

2 Understanding cryptography, data security and financial intelligence Recognizing vulnerabilities and how to deal with that knowledge Acquire knowledge on cyber ethics and the legal framework SCHEDULE AND OUTLINE MONDAY 26 OCTOBER (DAY 1) INTRODUCTION TO CYBERSECURITY Evolution of Information Security Cyber security Theory Concepts and Definitions Government versus Private models Threats and Vulnerabilities Malware Analysis Strategies versus Defense/Cyber Kill Chain THREAT ACTORS AND INTELLIGENCE Understanding the threat landscape and Actors Identifying critical threats and how to counter them Critical Infrastructure Protection (CIP) Critical Energy Infrastructure Protection (CEIP) Cyber intelligence capabilities and Espionage Surveillance and Reconnaissance Big Data TUESDAY 27 OCTOBER (DAY 2) CRYPTOGRAPHY AND DATA SECURITY History of Cryptography and Cryptanalysis Conventional and public-key Cryptography Cryptographic Protocols and Cryptanalytic Techniques Electronic mail security/network Layer Security Transport layer and Web Security Virtual private networks ETHICS IN CYBER SECURITY AND CYBER LAW Privacy Intellectual Property Professional Ethics Fair User and Ethical Hacking

3 Internet Fraud Cybercrimes Forensic Technologies Digital Evidence Collection Evidentiary Reporting WEDNESDAY 28 OCTOBER (DAY 3) FINANCIAL CYBER INTELLIGENCE GLOBAL CYBER CAPABILITIES AND TRENDS Global trends Capabilities of Nation States Capabilities of non-state actors Theory and Practice of Cyber War THURSDAY 29 OCTOBER (DAY 4) CYBER WARFARE Emerging policies Doctrines and national strategies Operational requirements at nation state level Battle space perspective Cyber assets in warfare CASE STUDIES & EXERCISE FRIDAY 30 OCTOBER (DAY 5) COOPERATION AND FUTURE PROSPECTS International cooperation in Cyber Security Intelligence sharing Standardization of national cyber strategies Knowledge applied to case studies Lessons learned GRADUATION CEREMONY N.B. Please note that the specific items in the schedule may be subject to change

4 WHAT WILL YOU RECEIVE In addition to 36-hours of instruction, all students attending the Cyber Security and Awareness Course will receive the following: LSN Certificate of Completion suitable for framing; All course materials used throughout the 5-day course; One Year membership of Lowlands Solutions Netherlands(LSN) in which you receive a 20% discount on tuition on one LSN course and/or module until November ABOUT THE INSTRUCTORS During the course you will encounter numerous instructors with a background at the Dutch Ministry of Defence (Intelligence), The Hague University of Applied Sciences, EUROPOL, Home Office and the London Metropolitan University (LMU). ENROLLMENT Tuition: EURO 1549 (ex VAT) (Group discounts available, please contact for details.) Enrollment in the LSN course also includes catered lunches and coffee breaks Students that wish to enroll for this course should use the course enrollment form attached to this invitation or use the Adobe PDF on our website. When completed forward the enrollment form to LSN by or to our postal address. When your registration form is processed, you will receive a confirmation by after which an invoice will be sent for the total course fee. Once the payment has been received by our organisation your seat in the Criminal Intelligence Analysis Course is guaranteed. Please read the attached LSN Course Enrollment Terms and Conditions prior to registration. Questions regarding enrollment may be submitted to the following

5 LODGING AND TRAVEL INFORMATION The LSN Cyber Security, Intelligence and Awareness Course will be conducted on-site at the Park Hotel The Hague in the Netherlands. Parkhotel Den Haag Molenstraat 53, 2513 BJ, The Hague Phone: +31 (0) Fax: +31 (0) Website: Available rates EUR 99 (budget room), EUR 129 (superior room for single use), EUR 139 (superior room for double use). Room rates are per night including the breakfast buffet and city tax EUR 4,60p.p.p.n. For hotel information please use the link on our website. Parking: there is limited availability for indoor parking. Reservation is required, EUR 22,50 per overnight stay. Payment: upon departure by the guest. Please do not make a reservation prior to course- and enrollment confirmation by Lowlands Solutions Netherlands (LSN).

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

Privacy in the Digital Age of Encryption and Anonymity Online

Privacy in the Digital Age of Encryption and Anonymity Online The Hague (NL), 19-20 May 2016 ACCESSING FILES. ACCESS DENIED! DATA ENCRYPTED. TARGET GROUP This conference is open to anyone who is dealing with privacy and security in an online environment. Europol

More information

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach

Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach Capacity Building in Cyber Security Literacy: An Inter-disciplinary Approach This material is based upon work supported by the National Science Foundation under Grant No. 1516724 Project Organization University

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

Big 4 Information Security Forum

Big 4 Information Security Forum San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL

More information

6th Annual Homeland Security Professionals Conference & Expo October 3-7, 2011

6th Annual Homeland Security Professionals Conference & Expo October 3-7, 2011 This year s conference looks at developments around the Globe that will impact on terrorism and crime in the USA. Instead of looking at attack response, as in past years, the conference will be dedicated

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

RPAD 545 445 Principles and Practices of Cyber Security. Course Summary:

RPAD 545 445 Principles and Practices of Cyber Security. Course Summary: RPAD 545 445 Principles and Practices of Cyber Security Course Summary: Our world is more connected today than it has ever been in our history. Tomorrow we will be more connected than we are at this very

More information

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings:

BOR 6432 Cybersecurity and the Constitution. Course Bibliography and Required Readings: BOR 6432 Cybersecurity and the Constitution Course Description This course examines the scope of cybercrime and its impact on today s system of criminal justice. Topics to be studied include: cybercrime

More information

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking Appendix A: Gap Analysis Spreadsheet Competency and Skill List Competency Critical Thinking Data Collection & Examination Communication & Collaboration Technical Exploitation Information Security Computing

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

Information Security and Cryptography

Information Security and Cryptography Information Security and Cryptography Fundamentals and Applications June 1-3, 2015 Zurich, Switzerland Lecturers: David Basin, ETH Zurich Ueli Maurer, ETH Zurich ATG www.infsec.ch Program Starting 09:00

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Bertram Aitchison Art History Breaks January, 2016

Bertram Aitchison Art History Breaks January, 2016 Bertram Aitchison Art History Breaks January, 2016 The Green Park Hotel, Clunie Bridge Road, Pitlochry, Perthshire, PH16 5JY Telephone: 01796 473248 Fax: 01796 473520 Email: bookings@thegreenpark.co.uk

More information

Advanced Summer Programme

Advanced Summer Programme Advanced Summer Programme Countering Terrorism: Legal Challenges and Dilemmas 24-28 August 2015 *PROGRAMME Monday 24 August (Day 1): Countering Terrorism: Introduction and Legal Frameworks 08.45 09.00

More information

26 th Annual Texas Crime Stoppers Conference October 8-10, 2014

26 th Annual Texas Crime Stoppers Conference October 8-10, 2014 The Texas Crime Stoppers Council s 26 th annual conference is hosted by Beaumont Crime Stoppers. The conference begins at noon on Wednesday, October 8, and ends at noon on Friday, October 10, 2014. The

More information

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY.

INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. INTELLIGENCE. RISK MITIGATION. RESPONSE. CONSULTANCY. 23 Grafton Street London W1S 4EY UK Main Tel: +44 (0) 207 887 2699 ABOUT PGI PGI is a privately owned UK business offering integrated, intelligence-led

More information

The enemies ashore Vulnerabilities & hackers: A relationship that works

The enemies ashore Vulnerabilities & hackers: A relationship that works The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively

More information

Master of Science in Cyber Security and Management

Master of Science in Cyber Security and Management Master of Science in Cyber Security and Management Introduction Realizing the importance of protecting her critical national information infrastructure, Malaysia has introduced the National Cyber Security

More information

Gregg Gerber. Strategic Engagement, Emerging Markets

Gregg Gerber. Strategic Engagement, Emerging Markets Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

INTELLIGENCE AND CYBERSECURITY SEMINAR SERIES. Transforming Your Research and Analytic Skills

INTELLIGENCE AND CYBERSECURITY SEMINAR SERIES. Transforming Your Research and Analytic Skills INTELLIGENCE AND CYBERSECURITY SEMINAR SERIES Transforming Your Research and Analytic Skills Spring 2015 Contents A 21st Century Skillset 3 Course Dates 5 Course Fees 6 Open Source Intelligence 7 Advanced

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1 CONTENTS Digital criminality Intelligence-led security Shylock case study Making

More information

Developments in cybercrime and cybersecurity

Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity Developments in cybercrime and cybersecurity As customers and clients increasingly go online to do their banking with convenience, privacy and security their

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

Cyber Security Review

Cyber Security Review ISSN 2055-6950 (Print) ISSN 2055-6969 (Online) Cyber Security Review Winter 2014/15 CYBERCRIME AS A NATIONAL SECURITY ISSUE CECSP: TOWARDS EFFECTIVE COLLABORATION ON CYBER SECURITY IN CENTRAL EUROPE TECHNICAL

More information

Seminar on Information Security Get comprehensive Security-know-how in just one week! Introduced by your trusted security partner.

Seminar on Information Security Get comprehensive Security-know-how in just one week! Introduced by your trusted security partner. Seminar on Information Security Get comprehensive Security-know-how in just one week! Introduced by your trusted security partner. Education in information security made in Switzerland. Education Services

More information

FOREST EUROPE EXPERT LEVEL MEETING FOR THE PREPARATIONS OF THE EXTRAORDINARY MINISTERIAL CONFERENCE PRACTICAL INFORMATION

FOREST EUROPE EXPERT LEVEL MEETING FOR THE PREPARATIONS OF THE EXTRAORDINARY MINISTERIAL CONFERENCE PRACTICAL INFORMATION FOREST EUROPE EXPERT LEVEL MEETING FOR THE PREPARATIONS OF THE EXTRAORDINARY MINISTERIAL CONFERENCE 6-7 November 2014, NH Hotel, Cuenca, Spain PRACTICAL INFORMATION Bellow you will find information on

More information

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission

Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government

More information

Data Protection Compliance in the EU

Data Protection Compliance in the EU Advanced Training Course Data Protection Compliance in the EU Maastricht (NL), 7-9 December 2015 European Institute of Public Administration Institut européen d administration publique Introduction Target

More information

Performance Management in Public Sector Organisations: The Contribution of the CAF

Performance Management in Public Sector Organisations: The Contribution of the CAF Seminar Performance Management in Public Sector Organisations: The Contribution of the CAF Maastricht (NL), 17-19 February 2016 European Institute of Public Administration Institut européen d administration

More information

for the Caravan & Holiday Parks Industry

for the Caravan & Holiday Parks Industry 2014 CRVA NATIONAL CONFERENCE The Must Do Event for the Caravan & Holiday Parks Industry Join CRVA and representatives from all sectors of the Caravanning Industry at the CRVA National Conference! Sponsorship

More information

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Program Organizer: Please join us for a NEW Invitation Only Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down Role of Firm Leadership, IT, COO, General Counsel Data Breaches Identification

More information

Intelligence, Statecraft and Multi-dimensional Security in the Caribbean

Intelligence, Statecraft and Multi-dimensional Security in the Caribbean Module 5 Intelligence, Statecraft and Multi-dimensional Security in the Caribbean September 8 12, 2014 Trinidad & Tobago Website http://sta.uwi.edu/iir/academy.asp Telephone: (868) 662-2002 ext. 83237

More information

FINAL SCHEDULE YEAR 1 AUGUST 18 22 WEEK 1

FINAL SCHEDULE YEAR 1 AUGUST 18 22 WEEK 1 YEAR 1 AUGUST 18 22 WEEK 1 TIME MONDAY (18) TUESDAY (19) WEDNESDAY (20) THURSDAY (21) FRIDAY (22) 11am 1 LUNCH LUNCH LUNCH LUNCH LUNCH 3 YEAR 1 AUGUST 25 29 WEEK 2 TIME MONDAY (25) TUESDAY (26) WEDNESDAY

More information

INVITATION TO INTERNATIONAL DIGITAL, MOBILE AND COMPUTER FORENSICS CONFERENCE, (TINAPA2014) TINAPA, CALABAR, CROSS RIVER STATE, NIGERIA

INVITATION TO INTERNATIONAL DIGITAL, MOBILE AND COMPUTER FORENSICS CONFERENCE, (TINAPA2014) TINAPA, CALABAR, CROSS RIVER STATE, NIGERIA 6 th October 2014 Dear Sir/Ma, INVITATION TO INTERNATIONAL DIGITAL, MOBILE AND COMPUTER FORENSICS CONFERENCE, (TINAPA2014) TINAPA, CALABAR, CROSS RIVER STATE, NIGERIA Computer Forensics Institute, Nigeria

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Who s Doing the Hacking?

Who s Doing the Hacking? Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from

More information

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva Finnish Cyber Security Strategy Permanent Secretary, LTG Arto Räty Chairman of the Security Committee 15.1.2015, Geneva 1 Changing threat landscape 2 Annual losses caused by cybercrime over $400 billion

More information

Academic Calendar for Faculty

Academic Calendar for Faculty Summer 2013 Term June 3, 2013 (Monday) June 3-4, 2013 (Monday Tuesday) June 5, 2013 (Wednesday) June 5-6, 2013 (Wednesday Thursday) June 6, 2013 (Thursday) July 3, 2013 (Wednesday) July 4, 2013 (Thursday)

More information

Cyber Learning Solutions

Cyber Learning Solutions Cyber Learning Solutions 2014 Extended Course Catalog Raytheon Cyber Solutions Inc. (RCSI) cyber-training@list.app.ray.com www.raytheon.com 1 Raytheon Cyber Learning Solutions 2014 Catalog CONTENTS The

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)

More information

New challenges in Data privacy.

New challenges in Data privacy. New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013

More information

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog.

I. PREREQUISITE For information regarding prerequisites for this course, please refer to the Academic Course Catalog. Note: Course content may be changed, term to term, without notice. The information below is provided as a guide for course selection and is not binding in any form, and should not be used to purchase course

More information

Part-time Diploma in InfoComm and Digital Media (Information Systems) Certificate in Information Systems Course Schedule & Timetable

Part-time Diploma in InfoComm and Digital Media (Information Systems) Certificate in Information Systems Course Schedule & Timetable Certificate in Information Systems Course Schedule & Timetable Module Code Module Title Start Date End Date Coursework Final Exam PTDIS010101 Management Information Tue, April 16, 2013 Tue, 2 April 2013

More information

August 16 August 22, 2009 November 1 November 7, 2009

August 16 August 22, 2009 November 1 November 7, 2009 Homeland Security Executive Certificate Studies Program Strategies for Combating Terrorism: Lessons from Experts in High-Risk Environments August 16 August 22, 2009 November 1 November 7, 2009 S ecurity

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

CYBER SECURITY FOUNDATION - OUTLINE

CYBER SECURITY FOUNDATION - OUTLINE CYBER SECURITY FOUNDATION - OUTLINE Cyber security - Foundation - Outline Document Administration Copyright: QT&C Group Ltd, 2014 Document version: 0.2 Author: N R Landman (MD and Principal Consultant)

More information

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY

MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY MODULES FOR TRAINING PROGRAMMES ON CYBER SECURITY 1) Awareness Programme on Cyber Security for Users of Computer Awareness Programme on Cyber Security for Users of Computer 1 day To make the users of computers

More information

Certificate in Cyber Security

Certificate in Cyber Security Certificate in Cyber Security Offered as a partnership between Cape Peninsula University of Technology (CPUT), French South African Institute of Technology (F SATI), CS Interactive Training and Boshoff

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge

More information

ISSA SOUTH TEXAS CHAPTER NEWSLETTER

ISSA SOUTH TEXAS CHAPTER NEWSLETTER Page 1 of 5 ISSA SOUTH TEXAS CHAPTER NEWSLETTER For May 2013 Voted "Outstanding Chapter of 2007" by ISSA International As always, please feel free to contact me with any suggestions or requests to improve

More information

Invitation. International Series Part of Badminton Europe Circuit 2014/2015. Norwegian International Championships 2014

Invitation. International Series Part of Badminton Europe Circuit 2014/2015. Norwegian International Championships 2014 Invitation International Series Part of 2014/2015 Norwegian International Championships 2014 Venue: Jotunhallen, Sandefjord 13.-16. November 2014 Closing date: 21st October Norwegian Badminton Association

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

The EU s approach to Cyber Security and Defence

The EU s approach to Cyber Security and Defence Workshop "Cyberwar & Cyberpeace Berlin, 23 Oct 15 Wolfgang Röhrig EDA Programme Manager Cyber Defence Woilfgang.Roehrig@eda.europa.eu +32 (0)2 504 2966 Political & Strategic Framework Dual-Use Specific

More information

Building a Cyber Resilient Society in SEE (IRC-O1-P-16) 27 April 2016 Rakitje, Croatia

Building a Cyber Resilient Society in SEE (IRC-O1-P-16) 27 April 2016 Rakitje, Croatia Centre for Security Cooperation Military Academy General Mihailo Apostolski - Skopje Building a Cyber Resilient Society in SEE (IRC-O1-P-16) 27 April 2016 Rakitje, Croatia The workshop Building a Cyber

More information

Seminar on Ethical Hacking and Cyber Crime Get comprehensive Know-how in just one week! Introduced by your trusted security partner.

Seminar on Ethical Hacking and Cyber Crime Get comprehensive Know-how in just one week! Introduced by your trusted security partner. Seminar on Ethical Hacking and Cyber Crime Get comprehensive Know-how in just one week! Introduced by your trusted security partner. Education in information security made in Switzerland. Education Services

More information

Certified Cyber Security Analyst VS-1160

Certified Cyber Security Analyst VS-1160 VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The

More information

A Primer on Cyber Threat Intelligence

A Primer on Cyber Threat Intelligence A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly

More information

Pre Conference Workshops Using AccessData Tools to Solve Computer Forensics Problems, Eric Thompson, AccessData. Free (ISC) 2 Workshop

Pre Conference Workshops Using AccessData Tools to Solve Computer Forensics Problems, Eric Thompson, AccessData. Free (ISC) 2 Workshop Day 0 09:00-18:00 Saturday Free (ISC) 2 Workshop October 4th, 2003 Pre Conference Workshops Using AccessData Tools to Solve Computer Forensics Problems, Eric Thompson, AccessData MEITSEC'2003 22/09/2003-14:06

More information

Europol Public Information VACANCY NOTICE. Senior Specialist ICT Solutions Architect (AD7), within the ICT Business Area

Europol Public Information VACANCY NOTICE. Senior Specialist ICT Solutions Architect (AD7), within the ICT Business Area The Hague, 08 September 2015 Reg. nº: Europol/2015/TA/AD7/219 VACANCY NOTICE Name of the Post: Senior Specialist ICT Solutions Architect (AD7), within the ICT Business Area Reporting to: Senior Specialist

More information

Interparliamentary conferences Dutch EU Presidency 2016. Practical information. Conference venue. App. Hotels

Interparliamentary conferences Dutch EU Presidency 2016. Practical information. Conference venue. App. Hotels Practical information Conference venue Hall of Knights Binnenhof 8-14 NL - 2513 AA Den Haag The Netherlands Access to the conference venue is through the entrance Binnenhof 11A. Guests with disabilities

More information

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015

CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 CSIS/DOJ Active Cyber Defense Experts Roundtable March 10, 2015 On March 10, 2015 the Center for Strategic and International Studies, in conjunction with the Cybersecurity Unit of the U.S. Department of

More information

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY CSCSS / ENTERPRISE TECHNOLOGY + SECURITY C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE CSCSS / ENTERPRISE TECHNOLOGY + SECURITY GROUP Information

More information

Managing the EU Policy Cycle: A Comprehensive One-Week Course on EU Decision-Making in Practice

Managing the EU Policy Cycle: A Comprehensive One-Week Course on EU Decision-Making in Practice Seminar Managing the EU Policy Cycle: A Comprehensive One-Week Course on EU Decision-Making in Practice Maastricht (NL), 29 June - 3 July 2015 European Institute of Public Administration Institut européen

More information

RouseABOUT Graphics Seminar 2008 Summer Session

RouseABOUT Graphics Seminar 2008 Summer Session RouseABOUT Graphics Seminar 2008 Summer Session A RouseABOUT Graphics Seminar is an advanced course in Rouse Balloon Graphics. Just as in a language immersion weekend, we will eat, sleep and breathe RMS

More information

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For

More information

Treasurers. Illinois Municipal Treasurers Association. Institute and Advanced Seminar for. November 15-19

Treasurers. Illinois Municipal Treasurers Association. Institute and Advanced Seminar for. November 15-19 Illinois Municipal Treasurers Association November 15-19 Doubletree Hotel Bloomington, IL Treasurers CPA s Financial Officers Support Staff Sponsored by Illinois Municipal Treasurers Association Eastern

More information

Cyber security guide for boardroom members

Cyber security guide for boardroom members Cyber security guide for boardroom members 2 Cyber security guide for boardroom members Cyber security at strategic level Our society is rapidly digitising, and we are all reaping the benefits. Our country

More information

Security & privacy in the cloud; an easy road?

Security & privacy in the cloud; an easy road? Security & privacy in the cloud; an easy road? A journey to the trusted cloud Martin Vliem CISSP, CISA National Security Officer Microsoft The Netherlands mvliem@microsoft.com THE SHIFT O L D W O R L D

More information

Training Workshop on Financial Analysis of Investment Project Scenarios with Application of COMFAR software. Training for Trainers

Training Workshop on Financial Analysis of Investment Project Scenarios with Application of COMFAR software. Training for Trainers Training Workshop on Financial Analysis of Investment Project Scenarios with Application of COMFAR software Training for Trainers UNIDO HQs, Vienna, Austria 18 to 22 May 2015 OBJECTIVES A 5-day Training

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

American Association of Christian Colleges & Seminaries, Inc.

American Association of Christian Colleges & Seminaries, Inc. American Association of Christian Colleges & Seminaries, Inc. President Dr. Richard Stratton Clearwater Christian College 3400 Gulf-to-Bay Blvd. Clearwater, FL 33759 Phone: (727) 726-1153 Fax: (727) 726-8597

More information

INFORMATION BULLETIN 1

INFORMATION BULLETIN 1 1 st WORLD DEAF YOUTH BADMINTON CHAMPIONSHIP 4 TH WORLD DEAF BADMINTON CHAMPIONSHIP Dear Sports Friends, INFORMATION BULLETIN 1 Bulgarian Deaf Sports Federation is pleased to invite the countries, members

More information

Assessing the Legacy of the ICTY

Assessing the Legacy of the ICTY 23-24 February 2010 World Forum conference centre, The Hague A Conference of the International Criminal Tribunal for the former Yugoslavia Co-organised and co-sponsored by the Government of the Netherlands

More information

NICB Medical Investigations Academy

NICB Medical Investigations Academy NICB Medical Investigations Academy The National Insurance Crime Bureau is pleased to announce the fall session of the Medical Investigations Academy. This training provides investigators in the insurance

More information

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy 2015 Michigan NASCIO Award Nomination Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy Sponsor: David Behen, DTMB Director and Chief Information Officer Program Manager: Rod Davenport,

More information

Training and Certification Programme for Data Protection Officers and Other Data Protection Professionals

Training and Certification Programme for Data Protection Officers and Other Data Protection Professionals Seminar Training and Certification Programme for Data Protection Officers and Other Data Protection Professionals Basic and Advanced Modules Maastricht (NL), 23-27 June 2014 EIPA, in cooperation with the

More information

Practical Steps To Securing Process Control Networks

Practical Steps To Securing Process Control Networks Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.

More information

ISTQB ADVANCED LEVEL TEST ANALYST CERTIFICATE IN SOFTWARE TESTING

ISTQB ADVANCED LEVEL TEST ANALYST CERTIFICATE IN SOFTWARE TESTING ISTQB ADVANCED LEVEL TEST ANALYST CERTIFICATE IN SOFTWARE TESTING Copyright 2015 ps_testware 1/6 Introduction The International Software Testing Qualifications Board (ISTQB) consists of Member Boards representing

More information

Special Focus: Fighting Botnets

Special Focus: Fighting Botnets Special Focus: Fighting Botnets 2 nd European Cybercrime Expert Forum Fighting Cybercrime: How Best to Cope with Current Cyber Threats 8 th - 9 th November 2012, Berlin Brochure With Experts from: European

More information

MARITIME LAW AND MARINE INSURANCE CLAIMS

MARITIME LAW AND MARINE INSURANCE CLAIMS AN INVITATION TO OUR ANNUAL COURSE ON MARITIME LAW AND MARINE INSURANCE CLAIMS 15-19 SEPTEMBER 2014 PEWTERERS HALL LONDON OBJECTIVE The objective of the course is to provide you with the confidence to

More information

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence

ARI 26/2013 (Translated from Spanish) 17 September 2013. Cyber cells: a tool for national cyber security and cyber defence ARI ARI 26/2013 (Translated from Spanish) 17 September 2013 Cyber cells: a tool for national cyber security and cyber defence Thiber Theme 1 Cyber cells are effective tools that enable countries to operate,

More information

Protecting your information

Protecting your information Protecting your information Secure your information Each year, governments, businesses and institutions suffer untold losses through not protecting their information. A UK government survey* puts the cost

More information

Sponsorship Opportunities

Sponsorship Opportunities 2015 THE INTERNATIONAL ASSOCIATION OF Conference on Philanthropy April 27-29 Loews Chicago O Hare, Rosemont, IL AiP 216 W. Jackson Blvd. Suite 625 Chicago, IL 60606 312.252.2501 The International Association

More information

FOR ASIAN-PACIFIC SENIOR OFFICERS. General information

FOR ASIAN-PACIFIC SENIOR OFFICERS. General information CESEDEN 2 nd HIGH DEFENCE STUDIES COURSE FOR ASIAN-PACIFIC SENIOR OFFICERS General information MAY 2013 SPANISH HIGHER DEFENCE STUDIES COLLEGE GENERAL INFORMATION 1. BACKGROUND As a result of Spain s interest

More information

CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM

CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM CFTC BRIEFING 2 JUNE 2015 CYBERSECURITY CONSIDERING BANK OF ENGLAND S CBEST PROGRAM Objectives Provide an overview of the CBEST program Overview will include answers to the following questions: What types

More information

Physical Protection Systems Training Course

Physical Protection Systems Training Course Physical Protection Systems Training Course CH2M HILL s Physical Protection Systems Training Course * presents a comprehensive approach to physical security for fixed sites such as banks, industrial plants,

More information

Training Workshop on Financial Analysis of Investment Project Scenarios with Application of COMFAR software. Beginners Level

Training Workshop on Financial Analysis of Investment Project Scenarios with Application of COMFAR software. Beginners Level Training Workshop on Financial Analysis of Investment Project Scenarios with Application of COMFAR software Beginners Level UNIDO HQs, Vienna, Austria 4 to 8 May 2015 OBJECTIVES A 5-day Training Workshop

More information

INTERNSHIP PROJECT DESCRIPTION

INTERNSHIP PROJECT DESCRIPTION The Hague, 23 April 2015 Reg. nº: 2015 O3 15 INTERNSHIP PROJECT DESCRIPTION Name of the project: Project allocation: Research and development Europol European Cybercrime Centre (EC3) Forensic Laboratory

More information