Programme. 8.30am am

Size: px
Start display at page:

Download "Programme. 8.30am. 10.40am"

Transcription

1 8.30am 9.00am 9.15am 9.35am 9.40am 8.30am 10.10am 10.40am 11.10am 11.35am 12.00pm 12.25pm 1.40pm 2.05pm 2.30pm 2.55pm 3.25pm 3.50pm 4.15pm Programme Registration Welcome Address Mr Lau Thiam Beng Deputy President (Operations) & President Defence Business, ST Electronics Opening Address Ms Jacqueline Poh, Managing Director, Infocomm Development Authority of Singapore Official Opening of ST Electronics DigiSAFE Cyber Security Centre The Intelligence Challenge in Cyber Brig-Gen (Res.) Yair Cohen, Head of Intelligence and Cyber Solutions Division, Elbit Systems Networking Break & Cyber Security Exhibit Demonstration The Hague Security Delta: Building Bridges by Sharing Knowledge in the Triple Helix for a National Innovation Agenda on Security Including Cyber Mrs Ida Haisman, Director, Hague Security Delta Cyber Security At the Frontline Everyday Mr Goh Eng Choon, General Manager, ST Electronics (Info-Security) Building Capacity for Cyber Security Mr Vivek R Chudgar, Director of Security Consulting Services (APJ), FireEye State of (In)Security Address for Government Websites Mr Wong Onn Chee, Chief Technology Officer, Resolvo Systems Networking Lunch Cyber Security Exhibit Demonstration & Tour of DigiSAFE Cyber Security Centre Securing the Cyber Environment Ms Pamela Warren, Director of Government Solutions, Palo Alto Networks Detecting and Combating Advanced Persistent Threats Ms Myla Pilao, Director Core Technology, TrendLabs by Trend Micro Evolving Cyber Risks and Implications: Making Better Informed Decisions Mr Eugene Teo, Senior Manager for Security Response, Symantec Networking Break & Cyber Security Exhibit Demonstration Optimising Threat Prevention in Today s World: Narrowing the Gap from Encounter to Containment Mr Vincent Oh. Regional Director, McAfee Security Maturity: Measuring the Effectiveness of Your SOC Mr Kelvin Wee, APJ Regional Product Manager HP ArcSight, HP Enterprise Security Products Closing Remarks and End of Seminar DigiSAFE SAP AG. Cyber All rights Security reserved. Centre 1

2 Brig. Gen. (Res.) Yair Cohen, Head of Intelligence and Cyber Solutions Division, Elbit Systems Brig. Gen. (Res.) Yair Cohen is the Head of Intelligence and Cyber Solutions Division at Elbit Systems Ltd. He is the former Commander of Unit 8200, the Central Military intelligence and Cyber Unit of the Israeli Defense Force. Brig. Gen. (Res.) Cohen served as Vice President of Elron Electronic Industries Ltd. and served on the boards of several of Elron s group companies DigiSAFE SAP AG. Cyber All rights Security reserved. Centre 2

3 Ida Haisma, Director The Hague Security Delta Ida Haisma is Executive Director of The Hague Security Delta (HSD). The HSD is the National Security Cluster for Innovation in the Netherlands. Previously, she was Director of Innovation, Safety and Security at TNO and was responsible for all the research projects on Resilience and Society as well as Security and Protection. TNO is the well-known Dutch Institute for Applied Research. Before her role at TNO, she was Managing Director of the Netherlands Centre for Crime Prevention and Community Safety (CCV). This Centre is an authority in an international, politically sensitive environment and stimulates cooperation between public-private partnerships in the fight against crime. CCV acts as a bridge between policy and practice. Ida s earlier roles included being Director of the Netherlands Knowledge Centre for Larger Towns and Cities, as well as Director Training & Development and Executive Board Member of the Clingendael Institute of International Relations in The Hague. At the moment, Ida is also a member of a Supervisory Board of a large welfare organisation DigiSAFE SAP AG. Cyber All rights Security reserved. Centre 3

4 Goh Eng Choon, General Manager ST Electronics (Info-Security) Mr Goh Eng Choon is the General Manager of ST Electronics (Info- Security) Pte Ltd. A technology-driven company that focuses in advanced info-assurance security products and cyber security capabilities. His last appointment was Managing Director in a fast growing SME, specialising in security, command and control systems. Prior to that, he had served in the SAF as a military officer. His last appointment was the Head of Plans Branch in Headquarter signals for the Army DigiSAFE SAP AG. Cyber All rights Security reserved. Centre 4

5 Vivek Chudgar, Director of Security Consulting Services FireEye Vivek Chudgar is a Managing Director of Security Consulting Services, responsible for managing client relationships and sales and delivery of Mandiant services in the APJ region. Vivek focuses on the Incident Response and Proactive Assessment services. He also plays a key role in identifying, developing and delivering new services to address the Governance, Risk, and Compliance needs of Mandiant and FireEye clients. Vivek has over 15 years of leadership and functional experience with providing a wide range of Enterprise Security and Technology consulting services to clients in multiple geographies. Vivek has a deep understanding of technology and management fundamentals, which enables him to recognize the challenges with information security management. As a seasoned risk practitioner, Vivek knows the information security threat vectors and understands how they operate. This has enabled Vivek to design and deploy effective information security strategies and controls, as well as investigate and respond to incidents where controls may have been breached and sensitive information compromised. Prior to joining FireEye, Vivek was the Global Head of the Information Security Compliance Practice at TCS, one of the top ten IT consulting and services firms in the world. Previously, Vivek worked as a Principal Consultant with McAfee on the Foundstone Professional Services team, where he led the Risk and Compliance service lines and successfully delivered a wide range of related services including large incident response engagements to McAfee s U.S. clients. Vivek earned an MBA in General Management from IIM Ahmedabad and an MS degree from Carnegie Mellon University, specializing in Information Security. Vivek s research interests span the areas of information risk measurement and management. His research at Carnegie Mellon University's CYLAB also focused on investigating the malicious behavior of relay nodes participating within wireless ad-hoc networks DigiSAFE SAP AG. Cyber All rights Security reserved. Centre 5

6 Pamela Warren, Director of Government Solutions Palo Alto Networks Pamela Warren is the Director of Government Solutions at Palo Alto Networks where she shares the company s global government support with government leaders to facilitate the exchange of innovative approaches to cyber security across the industry. She has spent her entire career in the security industry, serving both the U.S. intelligence community and the private sector. During her tenure in private industry, she has served as Director of Critical Infrastructure Protection initiatives and as Cybercrime Strategist at McAfee, worked on big data challenges for intelligence analysis, U.S. Homeland Security initiatives and solutions to the global data loss problem, and on other key government initiatives in companies across Silicon Valley. Throughout her career, Ms. Warren has served on the Board of the National Cyber Security Alliance (NCSA), the DSL Forum security working group, ANSI X9, and on the cybersecurity working group of the U.S. National Security Telecommunications Advisory Council. She was also honored with the Executive Women Forum's Women of Influence award for private industry. She holds a Master s degree in telecommunications from the George Washington University, and is a Certified Information Systems Security Professional (CISSP) and Certified Information Privacy Professional (CIPP) DigiSAFE SAP AG. Cyber All rights Security reserved. Centre 6

7 Myla Pilao, Director Core Technology TrendLabs by Trend Micro Myla Pilao leads security research communications at TrendLabs, Trend Micro s Research and Development Center. She heads the division of the company that monitors the security threat landscape, including high-profile attacks like advanced persistent threats (APTs) and prevalent Internet security threats like mobile malware. She oversees a team that monitors and manages critical incidents and developments in the threat landscape. She supervises the development of global materials supporting communication plans to broaden understanding on the threat landscape and security information. She has been guest speaker in numerous international security conferences sharing her insights on digital threats and its impact on the computing public and countermeasure strategies. Myla is also an active supporter and advocate of Internet Safety for Kids and Families, a Trend Micro initiative that promotes safe online practices, and has discussed extensively on the topics of keeping kids protected online. Myla holds a Master s Degree in Business Administration from the National University in Singapore. She earned her Bachelor s Degree in Arts and Letters, major in Communication Arts, from the University of Santo Tomas DigiSAFE SAP AG. Cyber All rights Security reserved. Centre 7

8 Eugene Teo, Senior Manager for Response Symantec Eugene Teo is the Senior Manager for Security Response in Singapore, responsible for leading a multi-functional security response team to monitor and analyze the emerging trends in the global threat landscape. In this role, Eugene and his team investigate high-impact security threats, deliver protection and incorporate security content into Symantec s enterprise and consumer product lines. Prior to joining Symantec, Eugene was with Red Hat for six years where he led the global cloud security team and played a pivotal role in investigating and managing security vulnerabilities reported in the Linux kernel. Eugene started his career as a cyber security researcher with the Centre for Strategic Infocomm Technologies (CSIT) where he researched and investigated threats for national defence. Eugene holds Bachelor s and Master s degrees in Computing from the National University of Singapore. His professional certifications include CISM, GCFA, GCIH, and RHCSS DigiSAFE SAP AG. Cyber All rights Security reserved. Centre 8

9 Vincent Oh, Regional Director McAfee Vincent Oh is responsible for evangelizing digital security, empowering our channel partners and enabling the pre-sales function for McAfee s business in South East Asia and India. He has close to 25 years of experience in various enterprise-class disciplines such as information security, business intelligence and big data analytics, enterprise content and knowledge management, artificial intelligence, high-end interactive computer graphics, and digital media. Passionate about improving the security postures of customers, people and communities, Vincent is a frequent speaker at regional seminars and international conferences, and has authored and co-authored many technical papers, articles and books DigiSAFE SAP AG. Cyber All rights Security reserved. Centre 9

10 Kelvin Wee, APJ Regional Product Manager HP ArcSight HP Enterprise Security Products With over a 16 years of IT security experience, Kelvin Wee has been involved with the consultancy and implementation of endto-end security solutions in the area of security applications and technologies. Kelvin is currently responsible for defining the long term strategy as well as the technical partnerships for the HP ArcSight solutions in the Asia Pacific and Japan region DigiSAFE SAP AG. Cyber All rights Security reserved. Centre 10

Cyber Security Operations Associate

Cyber Security Operations Associate ST Electronics (Info-Security) Pte Ltd ST Electronics (Info-Security) Page 1 Cyber Security Operations Essentials: Live cyber security training to build Detection, Response & Recovery capability In today

More information

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation

More information

Big 4 Information Security Forum

Big 4 Information Security Forum San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL

More information

Energy Efficiency Adoption for Green Data Centres Seminar. 13 th November 2015, Friday 9.00am 12.30pm

Energy Efficiency Adoption for Green Data Centres Seminar. 13 th November 2015, Friday 9.00am 12.30pm Energy Efficiency Adoption for Green Data Centres Seminar 13 th November 2015, Friday 9.00am 12.30pm Introduction The energy cost of data centres is known to make up a significant percentage of a business

More information

Infocomm Security Masterplan 2

Infocomm Security Masterplan 2 INFOCOMM DEVELOPMENT AUTHORITY OF SINGAPORE 8 Temasek Boulevard #14-00 Suntec Tower 3 Singapore 038988 Tel : 65-62110888 Fax : 65-62112222 www.ida.gov.sg April 2009 Infocomm Security Masterplan 2 The Infocomm

More information

Cyber Security Operations Specialist

Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd ST Electronics (Info-Security) Page 1 Cyber Security Operations Essentials: Live cyber security training to build Detection, Response

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

REGISTER AT IIF.COM/TRAINING

REGISTER AT IIF.COM/TRAINING IIF EXECUTIVE PROGRAM ON PRIVATE BANKING AND WEALTH MANAGEMENT Evolving Wealth Transformation in Dynamic Growth Markets November 16-17, 2015 Singapore IN COOPERATION WITH COURSE DESCRIPTION IIF EXECUTIVE

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

How To Protect Your It Infrastructure

How To Protect Your It Infrastructure Proactive Real-Time Monitoring and Risk Management Managed Security Services NCS Group Offices Australia Bahrain Brunei China Dubai Hong Kong SAR Korea Malaysia Philippines Singapore Sri Lanka Understanding

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

Zak Khan Director, Advanced Cyber Defence

Zak Khan Director, Advanced Cyber Defence Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts

More information

SYMANTEC CYBERV ASSESSMENT SERVICE OVER THE HORIZON VISIBILITY INTO YOUR CYBER RESILIENCE MORE FOCUS, LESS RISK.

SYMANTEC CYBERV ASSESSMENT SERVICE OVER THE HORIZON VISIBILITY INTO YOUR CYBER RESILIENCE MORE FOCUS, LESS RISK. SYMANTEC CYBERV ASSESSMENT SERVICE OVER THE HORIZON VISIBILITY INTO YOUR CYBER RESILIENCE Cyberspace the always-on, technologically hyperconnected world offers unprecedented opportunities for connectivity,

More information

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing

More information

2014 Montana Government IT Conference. Securing Data Networks and People

2014 Montana Government IT Conference. Securing Data Networks and People Presenter: Matt Bennett, Genetec Leveraging the Cloud for Hybrid Video Surveillance Matt is based in Seattle, WA and is the Western North America pre-sales engineer for Genetec (the world s leader in unified

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042

HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360

More information

New challenges in Data privacy.

New challenges in Data privacy. New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

How To Understand And Manage Cybersecurity Risk

How To Understand And Manage Cybersecurity Risk White Paper A Framework to Gauge Cyber Defenses NIST s Cybersecurity Framework Helps Critical Infrastructure Owners to Cost-Effectively Defend National & Economic Security of the U.S. Executive Summary

More information

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call

NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call PRESS RELEASE NRF awards seven projects under the inaugural National Cybersecurity R&D Grant Call Singapore, 15 October 2014 (Wednesday) The National Research Foundation (NRF), Prime Minister s Office,

More information

Ty Miller. Director, Threat Intelligence Pty Ltd

Ty Miller. Director, Threat Intelligence Pty Ltd Ty Miller Director, Threat Intelligence Pty Ltd Security Specialist Creator of Threat Analytics CREST Tech Lead, Assessor, Board of Directors Trained likes of FBI, US DoD, US Mil, International Govt agencies,

More information

Developing a Mature Security Operations Center

Developing a Mature Security Operations Center Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and

More information

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS THE TEAM William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing

More information

REQUEST FOR INFORMATION

REQUEST FOR INFORMATION Department of Management Services REQUEST FOR INFORMATION Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services 3 September 2015 6506 Loisdale Rd, Ste 325

More information

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES. Mr. Bennett Hart, Senior Consultant in Intelligence, Operations, Technology, Training, Proposal Red Teams, and Key Personnel Selection. Mr. Hart is a member of the United States Air Force Senior Executive

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Reducing the Security Threat Window

Reducing the Security Threat Window I N F O N E T I C S R E S E A R C H S P E C I A L R E P O R T Reducing the Security Threat Window Infonetics Research Special Report Written by Analyst Jeff Wilson July 2014 Contents Businesses Are Increasing

More information

HP Cyber Security Control Cyber Insight & Defence

HP Cyber Security Control Cyber Insight & Defence HP Cyber Security Control Cyber Insight & Defence Security awareness at board level Security leadership is under immense pressure Cyber threat Extended supply chain Financial loss Reputation damage Cost

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Future Threat Landscape - How will technology evolve and what does it mean for cyber security? James Hanlon CISSP, CISM Security Strategist Office of the CTO EMEA Future Threat Landscape - How will technology evolve and what does it mean for cyber security? Think > What does the future of technology

More information

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.

Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls

More information

e-discovery Conference

e-discovery Conference Information Security & Protection Seminar June 15, 2011 8:00 a.m. to 3:30 p.m. Presented by: ARMA Greater Indianapolis Chapter Session 1: Physical Security, & Handling Classified Information Overview Rolls-Royce

More information

KEY TRENDS AND DRIVERS OF SECURITY

KEY TRENDS AND DRIVERS OF SECURITY CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures

More information

Introduction to Business Continuity Planning

Introduction to Business Continuity Planning Introduction to Business Continuity Planning Business Continuity and Disaster Resilience Forum May 10, 2012 Rizal Ballroom A, Makati Shangri-la Manila, Philippines Dr Goh Moh Heng President BCM Institute

More information

Cyber Security Risk Management

Cyber Security Risk Management Our Ref.: B1/15C B9/29C 15 September 2015 The Chief Executive All Authorized Institutions Dear Sir/Madam, Cyber Security Risk Management I am writing to draw your attention to the growing importance of

More information

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S.

Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Perceptions About Network Security Survey of IT & IT security practitioners in the U.S. Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: June 2011 Ponemon

More information

A global infrastructure to safeguard your business_

A global infrastructure to safeguard your business_ Global Security Services A global infrastructure to safeguard your business_ Global Solutions More than just peace of mind: increase confidence and reduce risk across your entire organisation_ How do you

More information

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private

More information

Supplier Vigilance: A Critical Layer of Defense

Supplier Vigilance: A Critical Layer of Defense Supplier Vigilance: A Critical Layer of Defense Lockheed Martin Information Security 1 Supply Chain Cyber Security Lockheed Martin October 23, 2013 Debbie Stuckey Waide Jones, CISSP 2 Synopsis Lockheed

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

Developing Secure Software in the Age of Advanced Persistent Threats

Developing Secure Software in the Age of Advanced Persistent Threats Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer

More information

TRANSATLANTIC CYBER SECURITY SUMMIT

TRANSATLANTIC CYBER SECURITY SUMMIT TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:

More information

Defending against modern threats Kruger National Park ICCWS 2015

Defending against modern threats Kruger National Park ICCWS 2015 Defending against modern threats Kruger National Park ICCWS 2015 Herman Opperman (CISSP, ncse, MCSE-Sec) - Architect, Cybersecurity Global Practice Microsoft Corporation Trends from the field Perimeter

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

Brochure More information from http://www.researchandmarkets.com/reports/3301109/

Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Brochure More information from http://www.researchandmarkets.com/reports/3301109/ Threat Intelligence Security Market by Solution (SIEM, Log Management, IAM, SVM, Risk Management, Incident Forensics),

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not

More information

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY 1 EXECUTIVE SUMMARY INTRODUCING THE 2015 GLOBAL THREAT INTELLIGENCE REPORT Over the last several years, there has been significant security industry

More information

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives

11/27/2015. Cyber Risk as a Component of Business Risk: Communicating with the C-Suite. Conflict of interest. Learning Objectives Cyber Risk as a Component of Business Risk: Communicating with the C-Suite Jigar Kadakia DISCLAIMER: The views and opinions expressed in this presentation are those of the author and do not necessarily

More information

2. Cyber security research in the Netherlands

2. Cyber security research in the Netherlands 2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Government Contract Cost Accounting Workshop

Government Contract Cost Accounting Workshop The Alabama Procurement Technical Assistance Center Program & Alabama Small Business Development Center Network Present: Government Contract Cost Accounting Workshop $75 Includes Lunch & Materials Thursday,

More information

Department of Homeland Security Federal Government Offerings, Products, and Services

Department of Homeland Security Federal Government Offerings, Products, and Services Department of Homeland Security Federal Government Offerings, Products, and Services The Department of Homeland Security (DHS) partners with the public and private sectors to improve the cybersecurity

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Rising to the Challenge

Rising to the Challenge CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

In the Dark report, 2011

In the Dark report, 2011 In the Dark report, 2011 CIP Webinar Pamela Warren, CISSP, CIPP Director of CIP Initiatives, McAfee Critical Infrastructure Studies 2 In The Crossfire (2010) 54% experienced large scale DDOS Nearly a third

More information

DHS. CMSI Webinar Series

DHS. CMSI Webinar Series DHS CMSI Webinar Series Renee Forney Executive Director As the Executive Director for the Cyberskills Management Support Initiative (CMSI), Ms. Forney supports the Undersecretary for Management (USM) for

More information

Data Analytics & Information Security

Data Analytics & Information Security Data Analytics & Information Security About The Speaker Practice Director at ERM M.S. Information Networking and Security CERT Coordination Center - Carnegie Mellon University Carnegie Mellon CyLab Agenda

More information

S. ll IN THE SENATE OF THE UNITED STATES

S. ll IN THE SENATE OF THE UNITED STATES OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS 1 SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS Synopsis SPSP Project Overview Phase I Summary Phase

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy 2015 Action Plan A LIVING ACTION PLAN WITH ANNUAL REVIEWS New Zealand s Cyber Security Strategy provides a single cohesive framework to ensure that New Zealand is secure, resilient

More information

IHLs-Industry partnerships play important role in training cyber security professionals and supporting growing cyber security industry

IHLs-Industry partnerships play important role in training cyber security professionals and supporting growing cyber security industry OPENING REMARKS BY DR YAACOB IBRAHIM, MINISTER FOR COMMUNICATIONS AND INFORMATION AND MINISTER IN CHARGE OF CYBER SECURITY AT THE OPENING CEREMONY OF TEMASEK POLYTECHNIC S IT SECURITY AND FORENSICS HUB,

More information

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond

More information

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work

National Cyber Security Awareness Month. Week Two: Creating a Culture of Cybersecurity at Work National Cyber Security Awareness Month Week Two: Creating a Culture of Cybersecurity at Work Webinar Recording and Evaluation Survey This webinar is being recorded and will be made available online to

More information

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA

CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

ATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013

ATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013 ATM Security Training Middle East Riyadh, Saudi Arabia There are now over 2 million ATM s in use globally according to the ATM Industry Association and a recent report by RBR estimates that there will

More information

CYBERSECURITY INDEX OF INDICES

CYBERSECURITY INDEX OF INDICES Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration

More information

Report on CAP Cybersecurity November 5, 2015

Report on CAP Cybersecurity November 5, 2015 Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets

More information

NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd

NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd NICF Cyber Security Operations Specialist DigiSAFE Cyber Security Centre ST Electronics (Info-Security) Pte Ltd NICF Cyber Security Operations Specialist Page 1 Cyber Security Operations Essentials 1.

More information

How To Get A Security Degree In Australia

How To Get A Security Degree In Australia Security and intelligence postgraduate 2015 INNOVATIVE AND CUTTING-EDGE PROFESSIONAL DEGREES THAT COMBINE THEORY WITH POLICY AND PRACTICE IN COUNTER TERRORISM, INTELLIGENCE, SECURITY AND STRATEGIC POLICING.

More information

Publications. Blueprint for U.S. Internet-Based egovernment and Homeland Security Operations November 8, 2001 Authors: Bill (F.

Publications. Blueprint for U.S. Internet-Based egovernment and Homeland Security Operations November 8, 2001 Authors: Bill (F. Publications Capitol Hill Briefing on Preventing Cyber Attacks September 21, 2001 With U.S. Sen. Bob Bennett (R-Utah) and U.S. Office of Management and Budget Blueprint for U.S. Internet-Based egovernment

More information

SINGAPORE HOSTS CIVIL AVIATION CYBER SECURITY CONFERENCE

SINGAPORE HOSTS CIVIL AVIATION CYBER SECURITY CONFERENCE SINGAPORE HOSTS CIVIL AVIATION CYBER SECURITY CONFERENCE 1. From 9 to 10 July 2015, Singapore will host more than 200 civil aviation stakeholders and security experts from over 16 countries, representing

More information

Cybersecurity on a Global Scale

Cybersecurity on a Global Scale Cybersecurity on a Global Scale Time-tested Leadership A global leader for more than a century with customers in 80 nations supported by offices in 19 countries worldwide, Raytheon recognizes that shared

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT

Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT Towards defining priorities for cybersecurity research in Horizon 2020's work programme 2016-2017 Contributions from the Working Group on Secure ICT - Research and Innovation of the NIS Platform 8 April

More information

Re-Imagining the Cyber Warrior of the Future

Re-Imagining the Cyber Warrior of the Future CSO Vantage Point : Re-Imagining the Cyber Warrior of the Future Close The Gap Today, Win the Fight Tomorrow Jeff Schilling Chief Security Officer FireHost The War is Real Perhaps James R. Clapper, U.S.

More information

Global Cyber Security Market Forecast and Opportunities, 2020

Global Cyber Security Market Forecast and Opportunities, 2020 Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast

More information

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am

Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am 1 of 7 5/8/2014 7:34 PM Posted by David A. Katz, Wachtell, Lipton, Rosen & Katz, on Sunday December 16, 2012 at 10:20 am Editor s Note: David A. Katz is a partner at Wachtell, Lipton, Rosen & Katz specializing

More information

The enemies ashore Vulnerabilities & hackers: A relationship that works

The enemies ashore Vulnerabilities & hackers: A relationship that works The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively

More information

Threat Intelligence. Benefits for the enterprise

Threat Intelligence. Benefits for the enterprise Benefits for the enterprise Contents Introduction Threat intelligence: a maturing defence differentiator Understanding the types of threat intelligence: from the generic to the specific Deriving value

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

CYBERSECURITY: ISSUES AND ISACA S RESPONSE CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services

More information

(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392)

(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392) (HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392) VISIT: WWW.TTCUS.COM (HTTP://WWW.TTCUS.COM /? HSTC=40060925.4FE4E58F02ECBE9D993453E16A8EB373.1374161815407.1374161815407.1374161815407.1&

More information

BT Assure Threat Intelligence

BT Assure Threat Intelligence BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks

More information

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security David Brezinski, Professional Services, Enterprise Security Architect Agenda Overview

More information