The Cloud & Big Data Policy Challenges for Asia

Size: px
Start display at page:

Download "The Cloud & Big Data Policy Challenges for Asia"

Transcription

1 The Cloud & Big Data Policy Challenges for Asia May Conference Report Keio International Center for the Internet and Society Korea University Cyber Law Centre

2 KICIS Keio International Center for the Internet & Society Keio University S202 Delta Building, Shonan Fujisawa Campus 5322 Endo, Fujisawa City Kanagawa Prefecture Japan 2

3 The Keio International Center for the Internet and Society in collaboration with the Korea University Cyber Law Centre was pleased to welcome to Tokyo May 30-31, 2013 a distinguished group of government and private sector representatives and academics from around the region for a conference devoted to the exploring the challenges in Asia stemming from the emergence of two and new and disruptive technologies the Cloud and Big Data. Over the two-day session, the implications for privacy and security of these technologies and the policy responses of the Japanese and Korea governments were discussed in a number of highly interactive keynote presentations and panel discussions. The final session of the conference was devoted to examining how countries in the region were dealing with these issues and what opportunities existed for mutual learning and deeper collaboration. Summaries and findings from the conference are presented below. Our goal is to encourage further discussion and cooperation on these many concerns in an effort to build a body of best practices in the Asia region from which to encourage further innovation in technology and its applications to society. 3

4 Introducing the Cloud & Big Data Wide scale adoption of Cloud Computing coupled with the ability to aggregate and analyze huge amounts of previously unavailable data (Big Data) can lower costs and improve decision-making in many critical development sector such as health care, education, employment, economic productivity, public safety, and natural disaster and resource management. Yet there remain many legitimate concerns about the Cloud and Big Data, most notably in the privacy and security areas for businesses and consumers. which could further complicate long-standing challenges, including inadequate technological infrastructure and economic and human resource bottlenecks. Professor Jiro Kokuryo, Dean of the School of Policy Management at Keio University, delivered a keynote presentation entitled, Social Capitalism: A Connected Civilization. He began with the observation that we are moving from an anonymous mass market to a connected services economy with the advent of social networks that remember everything. The business model is changing from ownership to rights licensing and sharing. Fixed prices are giving way to a The nature of privacy is changing. dynamic peak sensitive model. In this new environment, the nature of privacy is changing with a public domain balanced by a strictly private domain and a new community domain, where selected information can be shared. More study needs to go as to the norms and kinds of interaction within this community domain along with consideration of how to create social platforms that can gain trust and provide incentives for collaboration. Symantec Korea CEO Kyung-Won Chong addressed the issues of security in the cloud and privacy in big data from the viewpoint of a private company offering security solutions to governments, enterprises and consumers. In his keynote, Chong introduced the new trends that are driving new concerns for security and 4

5 privacy: the proliferation of personal information on the Internet, increasing use of private devices within the workplace, the soon to be commonplace emergence of wearable computing, the advent of facial recognition, the growth of social curation services that personalize the web for individuals, the rapid growth of M to M communications (the Internet of Things), and the concomitant threat from cyber crime. Responding to these trends requires three levels of information protection: identity and access control (for inbound traffic), information security (for outbound traffic) and information management (for 360 degree visibility). Most importantly, there needs to be a single point of control for all applications and services, users and devices and for compliance purpose. Cloud security is based on painstaking information collection about potential threats and the delivery of realtime analysis. Thus, while big data presents security and privacy challenges, it also enables sophisticated analysis and response to threats. Symantec alone collates intelligence from its 135 million clients and tests the reliability of 3.6 million files and 100 million URLs and domains every six hours. Key Takeaways & Topics for Future Research Traditional market structures and practices are giving way to the emergence of a new space between the public and the private, where information is shared under defined conditions. Delineating and defending this space is a new focus for research. Success will require a 360 degree approach to the problem, i.e. the service provider and the consumer share a common interest with respect to privacy and security. The technologies, e.g. big data, that are driving these changes, can also help manage and solve privacy and security challenges. 5

6 Privacy, Cloud Computing There are both new and old privacy concerns associated with services and product offerings residing on the Cloud and employing Big Data. At issue is the distinction being made between big and personal data, the conditions under which these differently sourced data are used and mixed, and ultimately who owns the new product? How is the arrival of the Cloud and Big Data era changing the debate with regard to privacy in Japan and Korea? Is a common approach possible and/or desirable between Japan and Korea. Can they server as an example for others in Asia, given their position as the most technologically advanced countries in Asia with vibrant civil societies and respect for individual rights? What might be the key elements of such an approach? Keio University Professor Fumio Shimpo opened the session with a review of the current data protection system in Japan. He explained that discussions with regard to data protection began with the Administrative Agency Personal Protection Laws in the late 1980s, which applied only to information held by the government. In 2003, this arrangement was expanded to enterprise held data under the Act on the Protection of Personal Information. Since then privacy rules in Japan have evolved through guidelines developed by different government ministries and enforced in their sectors of responsibility. Unfortunately, this has resulted in a confusing and overlapping web of regulation covering areas from finance, land transport, education, health, and credit information. The government and private sector are currently seeking ways to address the challenge to provide more predictability and consistency in the application of the guidelines. Professor Nohyoung Park, Dean of the School of Law at Korea University, provided an overview of legal developments with respect to the transfer of data internationally. He cited data protection as one of the most developed areas of cloud regulation and noted that security and purpose limitation appeared to be the most common restrictions required in different jurisdictions. Enforcement, however, is another matter since data in many cases is always on the move. He suggested that a legal approach based on already existing understandings 6

7 of what outsourcing entails might be a fruitful approach. Less clear was how separate national approaches and disputes might be handled. Professor Park discussed what might be possible under the International Services Agreement now being negotiated at the WTO. Other models could be found in the language used in the Korea-US FTA and the Korea-EU FTA discussions. APEC also might provide a vehicle and a framework for data transfers within the Can the WTO provide a framework for securing the privacy of cross-border data transfers? through its Binding Corporate Rules (BCR) on data transfers. Asia Pacific region, specifically the Cross-Border Privacy Rules announced in November Professor Park observed that this could offer an opening to harmonize rules in Asia with those now being implemented in the EU SafeGov.org representative Jeff Gould focused on the privacy challenges presented by data mining, offering compelling evidence demonstrating how big data and big computing power make prediction and identification a surprisingly easy process. He used this analysis to pose the question of how can large amounts of data and the powerful analytic tools associated with them be safely managed when data mining is used for profit. This is a particularly important question in the context of young people and the schools, given the inroads that companies offering free services in return for access to information are making in education institutions. 7

8 Key Takeaways & Topics for Future Research Japan is currently considering the introduction of a data protection law, with a key consideration being how it is to be enforced. The US and the EU have significantly different approaches to data protection, but they both have created strong independent authorities that define and enforce privacy regulations in the case of the EU and voluntary multstakeholder codes of conduct in the US. To date, creating an independent enforcement mechanism has proven difficult in Japan. The lack of a central authority and an established dispute settlement mechanism has hindered international cooperation on privacy for Japan. A question deserving further research is whether privacy might be treated as a trade issue under the WTO or does it require a different institutional setting and process? The challenge of privacy needs to be addressed urgently in the light of the rapid growth of the technology and its penetration into all aspects of our lives, including the education of our children. Research is showing that consumers are increasingly concerned about the exploitation of their personal privacy for commercial reasons. Since trust is the glue that holds together the Internet, this concern is fundamental to its future. 8

9 9

10 Japan & Korea: Government Perspectives The Cloud does not respect borders. Data sharing between countries can be an important catalyst for economic growth and greater economic interdependence, but it can also cause tensions if managed poorly. What are the points of convergence and difference in the government policies toward the promotion of the Cloud and Big Data in Japan and Korea? Is there an opportunity for greater cross-border cooperation and, if so, how might it be structured? Japan MIC Information and Communications Deputy Director General Yasuhiko Taniwaki began his keynote presentation by outlining Japan s steady decline in the competitiveness of its ICT sector over the past ten years. He explained this with reference to the change from a device centered market, where Japan excelled, to a service centered market where Japan faced strong external competition. Another important change was the emergence of the user community, which added a further layer of complexity to the traditional four-layer model of ICT service delivery (infrastructure, network, platform, and applications/content). In this schema, data has been transformed into a service and that recognition is driving the need to make more government data accessible for secondary usage. Data has been transformed into a service, which is driving the need to make more government data accessible for secondary usage. This makes it all the more important that the Japanese government carry out its plans to successfully introduce a national ID system by 2016 and to give the newly appointed CIO the mandate to develop a national ICT plan. Japan must also estab- 10

11 lish a workable privacy framework, based on a privacy commission with a legal mandate rather than relying on privately administered codes of conduct. Steps also are required to train the next generation of software engineers and to find ways to encourage more innovation and risk taking. Finally, a growing portion of Japan s future ICT investment will be going to cope with its aging population and to develop a more efficient healthcare system. Korean MSIP Director General of Convergence Policy Seong Ju Kang declared in his keynote remarks that the Internet is the path to Korea s future growth. Government policy is to lay the basis for a creative economy through a partnership with the private sector, focused on promoting new ventures, streamlining laws and regulations and developing a creative economy index. Key elements include: 1. The education of talent in critical areas and government support for the commercialization of new ideas 2. The promotion of government and private investment in R&D, with the goal of making software a core component of the Korean economy 3. Achieving 90% penetration of one-gigabit network service by Securing Korean leadership in global Internet governance 5. Targeting global markets for exports and investment 6. Greater use of ICT in addressing social issues from aging to food safety 7. Creating a safe online environment and strengthening Korea s cyber security industry. 11

12 Key Takeaways & Topics for Future Research Professor Kilnam Chon, who moderated the session, challenged the speakers and the audience with his remark that Asia now represents the majority of Internet users it is time for us to tell the world where we want to go. In this context, the two presentations were excellent snapshots of where the Japanese and Korean governments are going in terms of developing their ICT strategies and industry. Japan still faces the need for significant institutional development to strengthen its regulatory framework in the ICT area and to develop strong central direction over its ICT policies. Korea has completed much of this reform, with the recent creation of the Ministry for Science, ICT and Future Planning (MSIP) and with the adoption of a strong privacy framework. Korea s focus is therefore appropriately on next tier issues, such as promotion of the software industry and developing a stronger voice on international Internet governance concerns. The Korean government s commitment to 90% penetration of one-gigabit internet service by 2017 is symbolic of its determination to nurture a strong Internet economy domestically. 12

13 13

14 Security, Cloud Computing, There is a major shift underway in how organizations use and share data that will require new approaches to security while distinguishing and continuing to address existing issues for enterprises and consumers. The scale of operations and the remote access that the Cloud makes possible are also its greatest vulnerabilities. What are the threats and what are the tools we need to manage and ultimately defeat them? What is the situation in Japan and Korea? What best practices might be shared? Is there a need for greater cooperation and information sharing between the private sectors of the two countries perhaps in conjunction with US partners? Keio University Professor Motohiro Tsuchiya gave a comprehensive overview of the security challenges in the era of big data in many ways foreshadowing the revelations that came the following week with news of the US National Security Agency PRISM program. Professor Tsuchiya provocatively asked which agency in the Japanese government is the counterpart for the NSA and whether Japan is prepared to deal with the increasing vulnerability of its cyber space to a potential attack. He urged scholars to join governments and industry in building a legal framework for dealing with this new international commons. Korea University Professor Jae Chul Suh, who is on-leave from the Korea Internet and Security Agency, provided a brief on how Korea perceives the increasingly threatening cyber security environment, particularly in the wake of the attack (likely from North Korea) on Seoul s banking system and broadcast companies. He described the trend of cyber attacks globally, which appear to be moving from simple monetary scams and amateur hacking to large-scale, systematic attacks supporting terrorism and targeting national infrastructure. He noted that Korea is the number one target for malicious code attacks and that these increased 400 percent from 2011 to The trend of cyber attacks appear to be moving from simple monetary scams and amateur hacking to large-scale, systematic attacks supporting terrorism and targeting national infrastructure. 14

15 Dr. Suh also outlined the details of the March 20, 2013 cyber-attack and the countermeasures taken by the Korean government, including issuance of a nationwide alert, analysis of the malicious code, creation and delivery of a vaccine to affected users, intensive monitoring to prevent follow up attacks, and increased efforts to engage and educate users. On lessons learned, he listed the need for greater investment in cyber security, including personnel and technology; the development of in depth defense (firewalls, keyboard security and vaccine development capability), the requirement for continued monitoring and vigilance, including audits and regular drills; and greater education and awareness of the threat. Korea is the number one target for malicious code attacks, increasing 400% from 2011 to 2102 Dr. Reiko Kondo from the Japan National Information Security Center (NISC) gave a comprehensive overview of Japanese cyber security history and policy. She described the pillars of information security as confidentiality, integrity, and availability and said that these elements are also relevant when big data security is discussed. She also outlined the increasing scale of attacks that Japan has experienced in recent years, including the 2010 DDOS on Japanese government agencies, the 2011 leak of 77 million customer identities resulting from an attack on the Sony Corporation, and the 2012 virus attacks at the Japan Aerospace Exploration Agency (JAXA) and Mitsubishi Heavy Industries. Dr. Kondo explained that information security and privacy are as much concerns for big data as they are for currently existing services. She further warned that these risks are magnified in a cloud computing environment with its remote processing. Dr. Kondo concluded that the Japanese government has established guidelines for cloud computing and that this effort will continue with attention paid to the need for international harmonization. 15

16 Key Takeaways & Topics for Future Research The speakers were unanimous in highlighting the increasingly problematic environment with respect to cyber security and the mounting urgency of the threat. These issues will only grow in the new era of cloud computing and big data. Both governments appear to be taking the right steps from a technical and organizational standpoint and in promoting public education awareness. There also is recognition that international cooperation and harmonization is essential no country can manage this threat alone. One goal for this conference was to increase dialogue on security between professionals in the field and academic experts. Clearly, the exchange of information needs to be continued and deepened. One issue that requires follow up is where the appropriate points of contact are within and without the two governments on cyber security so that counterpart relationships can be identified and secure channels for the exchange of information created. US cooperation with its European allies through NATO may offer some instructive examples for Asia and should be a topic for future research and discussion. 16

17 17

18 The Cloud & Big Data in Asia Currently, a broad discussion on the implications of these new technologies and services is occurring within APEC and ASEAN, as well as in bilateral contexts. Yet progress is slowed by the diversity of economic and political systems in the Asian region. What mechanisms and tools are available to foster greater collaboration within Asia? Is there an opportunity or risk - for an emerging Asian consensus that will differ in some respects from that in the US and Europe or will the region follow trends and policies established elsewhere? Professor Jun Murai, the Dean of the Faculty of Environment and Information Studies at Keio University and the father of Japan s Internet, began his keynote address by outlining the value proposition of the cloud and citing numerous practical examples where its deployment in Japan has saved money, time and, in the case of the 2011 earthquake/tsunami lives. Professor Murai headed the advisory committee that developed the just released draft recommendations outlining new directions for Japan s ICT policy. The plan has the twin goals of recovery from the devastation of the 2011 natural disaster and of the forging of a world class IT society in Japan focused on innovation, emergency planning and delivering public Cloud deployment in Japan has saved money, time and, in the case of the 2011 earthquake/tsunami lives. services using IT. Professor Murai provided a list of practical initiatives that Japan will be undertaking: the promotion of big data, development and delivery of new content online, deployment of IT in local governments, support for Japanese agriculture, new tools for energy management, teleworking, cloud-first e-government and enhanced government-wide IT planning. Supporting these initiatives will be longer term efforts to support human resource development in the IT field, attention to cyber security challenges, investment in research and development, the creation of an index rating system for Asia to benchmark progress and the development of an internationally harmonized privacy framework. 18

19 Professor Abu Bakar Munir from the University of Malaya highlighted the recent surge of policy attention to the issue of privacy in Asia, with China, India, Indonesia, Thailand, Taiwan, Korea, the Philippines, Hong Kong, Singapore and Australia all introducing variants of privacy legislation. His presentation featured an original chart comparing the privacy regimes of Korea, Malaysia, Taiwan, Singapore and the Philippines across 18 dimensions. No one country has developed a framework addressing all privacy concerns and time did not No country in Asia has developed a framework addressing all privacy concerns permit a full elaboration of each point, but this chart (which is available on the website as part of this presentation) offered a thought-provoking roadmap for discussion and research. Professor Hong Xue from Beijing Normal University in China provided an overview of cloud computing and the legislation of privacy in China. Despite significant differences in political and economic systems, many of the issues in China proved to be quite similar to those experienced elsewhere, e.g. the recent adoption of new regulations governing the collection and use of personal data and new ministerial guidelines for commercial transactions on the Internet. Professor Xue reported that there is interest in China in supporting a harmonized Asian framework for facilitating crossborder data flows, although there remain domestic restrictions with regard to server location. Professor Edmon Makarim from the University of Indonesia introduced in his presentation the competing concepts of privacy and security in Indonesia, beginning with how these issues are referenced in Indonesia s constitution. He highlighted the tensions between these principles in practice, especially in establishing a balance between the privacy of the individual and the security interests of the state. He stressed political culture as an intermediating variable Despite significant differences in political and economic systems, many of the issues in China have proven to be quite similar to those experienced elsewhere and discussed the differing foundations of the OECD Privacy Guidelines and the APEC Privacy Framework. Overall, his presentation underscored the diversity within Asia and the a priori need to develop common definitions as a first step in developing a pan Asia privacy and security framework. Professor Youn Jung Park from SUNY Korea started her presentation with a set of practical questions, asking who owns cloud data and who is in a position to set guidelines for cloud computing. She noted that the answer may depend on where the data is located and that a number of countries, Germany and Canada among them, have passed laws restricting 19

20 their corporations from storing data outside the country. One reason for this is the lack of common, interoperable standards, which that makes it difficult for consumers to move data from one cloud provider to another. This is especially true in Asia where regional cooperation through the Asia Pacific Privacy Authorities (APPA), APEC and ASEAN is still in its initial stages. Korea has been a pathfinder in this area. Since 2009, Korea has been working on a legal framework for cloud computing. A draft of the new legislation became available in May and it will be presented to the Assembly in September This national initiative could be both a spur and an obstacle to the larger global conversation on cloud computing that has been taking place in the IGF, the ITU and ICANN but a resolution is still far off. The lack of common, interoperable standards in Asia makes it difficult for consumers to move data from one cloud provider to another Key Takeaways & Topics for Future Research There is a yet no consensus in dealing with the privacy issues associated with the cloud and big data, despite the recent spurt of legislation in a number of key Asian countries. Differing political cultures, political systems and histories are important intervening variables. A possible next step is for Asian nations to develop an agreed set of indices that could support common perspectives in addressing issues related to Internet policy. Universities in Asia can play a potentially catalytic role in supporting efforts of governments and the private sector to nurture a common framework for the cloud and its companion, big data, in the Asia region. 20

21 KICIS Keio International Center for the Internet & Society Keio University S202 Delta Building, Shonan Fujisawa Campus 5322 Endo, Fujisawa City Kanagawa Prefecture Japan 21

Viewpoint: Implementing Japan s New Cyber Security Strategy*

Viewpoint: Implementing Japan s New Cyber Security Strategy* Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U) Appendix E: Case for Developing an International Cybersecurity Policy Framework (U//FOUO) The United States lacks a comprehensive strategic international policy framework and coordinated engagement

More information

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY,

COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, COMMUNIQUÉ ON PRINCIPLES FOR INTERNET POLICY-MAKING OECD HIGH LEVEL MEETING ON THE INTERNET ECONOMY, 28-29 JUNE 2011 The Seoul Declaration on the Future of the Internet Economy adopted at the 2008 OECD

More information

MANAGING THE GLOBAL INTERNET ECONOMY: A NEW CHALLENGE FOR THE US AND JAPAN

MANAGING THE GLOBAL INTERNET ECONOMY: A NEW CHALLENGE FOR THE US AND JAPAN MANAGING THE GLOBAL INTERNET ECONOMY: A NEW CHALLENGE FOR THE US AND JAPAN Jim Foster, Executive Director Keio International Center for the internet & society WHAT IS THE INTERNET? A global technology

More information

Privacy, the Cloud and Data Breaches

Privacy, the Cloud and Data Breaches Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, Information Integrity Solutions Legalwise Seminars Sydney, 20 March 2013 About IIS Building trust and privacy through global

More information

Asia Pacific (including Japan) Web Application Firewall Market CY2010

Asia Pacific (including Japan) Web Application Firewall Market CY2010 Asia Pacific (including Japan) Web Application Firewall Market CY2010 April 2011 1 Table of Contents Market Definition for Asia Pacific Web Application Firewall Market 10 Executive Summary Asia Pacific

More information

ACRAA and Harmonization under Asian Bond Market Initiative. By Mr. Kazuo Imai Chairman, Association of Credit Rating Agencies in Asia

ACRAA and Harmonization under Asian Bond Market Initiative. By Mr. Kazuo Imai Chairman, Association of Credit Rating Agencies in Asia ACRAA and Harmonization under Asian Bond Market Initiative By Mr. Kazuo Imai Chairman, Association of Credit Rating Agencies in Asia On the Occasion of 6 th Tokyo Roundtable on Capital Market Reform in

More information

The Asian Bankers Association (ABA) And Formal Workout Regime

The Asian Bankers Association (ABA) And Formal Workout Regime Position Paper PROVIDING THE LEGAL AND POLICY ENVIRONMENT TO SUPPORT EFFECTIVE INFORMAL WORKOUT REGIMES IN THE ASIA-PACIFIC REGION 1. The Asian Bankers Association (ABA) considers robust insolvency and

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

Privacy and Data Protection

Privacy and Data Protection Hewlett-Packard Company 3000 Hanover Street Palo Alto, CA 94304 hp.com HP Policy Position Privacy and Data Protection Current Global State of Privacy and Data Protection The rapid expansion and pervasiveness

More information

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010

CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 CO-CHAIRS SUMMARY REPORT ARF CYBERCRIME CAPACITY-BUILDING CONFERENCE BANDAR SERI BEGAWAN, BRUNEI DARUSSALAM APRIL 27-28, 2010 1. Pursuant to the decision made by expedited procedure from the ARF Senior

More information

Treasury Models: Proactive Planning and Execution

Treasury Models: Proactive Planning and Execution : Proactive Planning and Execution Across Asia Pacific, corporations are proactively examining treasury structures to support current and future growth plans. As a result, treasury enhancement projects

More information

How To Protect Your Organization From Insider Threats

How To Protect Your Organization From Insider Threats Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security FINANCIAL SERVICES EDITION #2015InsiderThreat RESEARCH BRIEF US FINANCIAL SERVICES SPOTLIGHT ABOUT

More information

Promoting Cross Border Data Flows Priorities for the Business Community

Promoting Cross Border Data Flows Priorities for the Business Community Promoting Cross Border Data Flows Priorities for the Business Community The movement of electronic information across borders is critical to businesses around the world, but the international rules governing

More information

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market May 2015 1 Contents Section Slide Number Executive Summary 3 Market Overview 9 Total Web

More information

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece

Network security policy issues. Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece Network security policy issues Ilias Chantzos, Director EMEA & APJ NIS Summer School 2008, Crete, Greece 1 Sample Agenda Slide 1 The current threat landscape 2 IT security and policy leadership 3 The EU

More information

Cyber Security Recommendations October 29, 2002

Cyber Security Recommendations October 29, 2002 Cyber Security Recommendations October 29, 2002 Leading Co-Chair (Asia/Oceania) Co-Chair (Americas) Co-Chair (Europe/Africa) Dr. Hiroki Arakawa Executive Vice President NTT Data Corporation Richard Brown

More information

Actions and Recommendations (A/R) Summary

Actions and Recommendations (A/R) Summary Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry

More information

Morningstar is shareholders in

Morningstar is shareholders in Media Contact: Andy Seunghye Jung, +82 2 3771 0730 or andy.jung@morningstar.comm FOR IMMEDIATE RELEASE Morningstar A Grade Announces Findings from Fourth Global Fund Investor Experience Report; Korea Scores

More information

(DRAFT)( 2 ) MOTION FOR A RESOLUTION

(DRAFT)( 2 ) MOTION FOR A RESOLUTION 05 Motions for resolutions, and other B8 documents 05_09. Motions to wind up debate on statements by other institutions: Rule 123(2) Cover page EUROPEAN PARLIAMENT 2014 2019 Plenary sitting [.2014] B[8-/2014](

More information

A Tipping Point The Fight for our Nation s Cyber Security

A Tipping Point The Fight for our Nation s Cyber Security A Tipping Point The Fight for our Nation s Cyber Security A GTRA Research Brief by Parham Eftekhari Co-Founder & Director of Research, GTRA December 2009 Introduction It is a widely accepted belief that

More information

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial

More information

2 Gabi Siboni, 1 Senior Research Fellow and Director,

2 Gabi Siboni, 1 Senior Research Fellow and Director, Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,

More information

2013 Frost & Sullivan Asia Pacific ICT Awards Network Security Vendor of the Year

2013 Frost & Sullivan Asia Pacific ICT Awards Network Security Vendor of the Year 2013 Frost & Sullivan Asia Pacific ICT Awards Network Security Vendor of the Year 2013 Frost & Sullivan Asia Pacific Network Security Vendor of the Year Frost & Sullivan s Global Research Platform Frost

More information

Data Management Session: Privacy, the Cloud and Data Breaches

Data Management Session: Privacy, the Cloud and Data Breaches Data Management Session: Privacy, the Cloud and Data Breaches Annelies Moens Head of Sales and Operations, IIS President, iappanz IACCM APAC Australia Sydney, 1 August 2012 Overview Changing privacy regulation

More information

Korea s s Approach to Network Security

Korea s s Approach to Network Security Korea s s Approach to Network Security 21 May 2002 Cha, Yang-Shin Ministry of Information and Communication 1 Contents Advancement in the Information Society and New Threats Information Infrastructure

More information

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Impact of Cybersecurity Innovations in Key Sectors (Technical Insights) Customized cybersecurity measures help overcome Industry specific challenges September 2014 Table of Contents Section Slide Number

More information

International Education Index comparative perspective from 21 countries. Janet Ilieva, PhD EDUCATION INTELLIGENCE

International Education Index comparative perspective from 21 countries. Janet Ilieva, PhD EDUCATION INTELLIGENCE International Education Index comparative perspective from 21 countries Janet Ilieva, PhD Background Rapid growth in participation in tertiary education across the world, in the number of students pursuing

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Asian Stock Markets in 2015:

Asian Stock Markets in 2015: Asian Stock Markets in 2015: Expected trends and the role of Asian Funds Passports Dr. Andrew Freris CEO, Ecognosis Advisory Ltd March 2015 1 Summary, Part I The Asian markets which outperformed in 2014,

More information

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations

DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations DIGITALEUROPE and European Services Forum (ESF) response to the Draft Supervision Rules on Insurance Institutions Adopting Digitalised Operations Brussels, October 2015 INTRODUCTION On behalf of the European

More information

Towards closer EU-ASEAN collaboration in cybersecurity

Towards closer EU-ASEAN collaboration in cybersecurity Supporting European Union and Southeast Asia ICT strategic partnership and policy dialogue: Connecting ICT EU-SEA Research, Development and Innovation Knowledge Networks Towards closer EU-ASEAN collaboration

More information

Global Forum 2014. Tokyo EVENT REPORT

Global Forum 2014. Tokyo EVENT REPORT Baker & McKenzie Global Forum 2014 Personal Data Protection: Global personal data risk and management - Trends and perspectives from Asia, Europe, and the US EVENT REPORT Global Forum 2014 MARCH 2014 TOKYO

More information

Four steps to improving cloud security and compliance

Four steps to improving cloud security and compliance white paper Four steps to improving cloud security and compliance Despite the widespread proliferation of cloud computing, IT decision makers still express major concerns about security, compliance, and

More information

How To Protect Your Endpoints From Attack

How To Protect Your Endpoints From Attack 2012 Endpoint Security Best Practices Survey GLOBAL RESULTS CONTENTS Executive Summary... 4 Methodology... 6 Finding 1: Top tier organizations fare better against attacks... 8 Finding 2: Top tier organizations

More information

Revised Action Plan of the Tripartite. (Japan, the People s Republic of China, and the Republic of Korea) Customs Cooperation

Revised Action Plan of the Tripartite. (Japan, the People s Republic of China, and the Republic of Korea) Customs Cooperation Revised Action Plan of the Tripartite (Japan, the People s Republic of China, and the Republic of Korea) Customs Cooperation The Customs and Tariff Bureau of Ministry of Finance, Japan, the General Administration

More information

ITU National Cybersecurity/CIIP Self-Assessment Tool

ITU National Cybersecurity/CIIP Self-Assessment Tool ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For

More information

Understanding the significance of the Asian Century. Andrea Haefner and Professor Andrew O Neill Griffith Asia Institute, Griffith University

Understanding the significance of the Asian Century. Andrea Haefner and Professor Andrew O Neill Griffith Asia Institute, Griffith University Understanding the significance of the Asian Century Andrea Haefner and Professor Andrew O Neill Griffith Asia Institute, Griffith University Griffith MBA Values If you undertake the Griffith MBA you will

More information

Asia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market

Asia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market Asia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market October 2014 Contents Section Slide Number Executive

More information

Perspectives on the ITU Plenipotentiary Meeting

Perspectives on the ITU Plenipotentiary Meeting US-Japan Internet Economy Private Working Group Joint Statement A Call to Facilitate the Greater Flow and Utilization of Global Data September 16, 2014 In March 2014, the private sectors of both the United

More information

CYBER SECURITY, A GROWING CIO PRIORITY

CYBER SECURITY, A GROWING CIO PRIORITY www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------

More information

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

More information

International Strategy on Cybersecurity Cooperation

International Strategy on Cybersecurity Cooperation 資 料 9-2 International Strategy on Cybersecurity Cooperation - j-initiative for Cybersecurity - October 2, 2013 Information Security Policy Council Contents 1 Objectives 1 2 Basic Principles 2 2.1 Ensuring

More information

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive

More information

Capabilities for Cybersecurity Resilience

Capabilities for Cybersecurity Resilience Capabilities for Cybersecurity Resilience In the Homeland Security Enterprise May 2012 DHS Cybersecurity Strategy A cyberspace that: Is Secure and Resilient Enables Innovation Protects Public Advances

More information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information

RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information www.wipro.com RESILIENCE AGAINST CYBER ATTACKS Protecting Critical Infrastructure Information Saritha Auti Practice Head - Enterprise Security Solutions, Wipro Table of Contents 03... Abstract 03... Why

More information

National Cyber Threat Information Sharing. System Strengthening Study

National Cyber Threat Information Sharing. System Strengthening Study Contemporary Engineering Sciences, Vol. 7, 2014, no. 32, 1755-1761 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.411235 National Cyber Threat Information Sharing System Strengthening

More information

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)

More information

2016 ASIA PACIFIC HIGH TECH TOTAL REMUNERATION DATABASE

2016 ASIA PACIFIC HIGH TECH TOTAL REMUNERATION DATABASE HEALTH WEALTH CAREER 2016 ASIA PACIFIC HIGH TECH TOTAL REMUNERATION DATABASE THE LEADING SOURCE OF COMPETITIVE PAY INFORMATION FOR THE HIGH TECH INDUSTRY WWW.IMERCER.COM/TRD 2 WANT TO UPGRADE YOUR COMPENSATION

More information

2012 Bit9 Cyber Security Research Report

2012 Bit9 Cyber Security Research Report 2012 Bit9 Cyber Security Research Report Table of Contents Executive Summary Survey Participants Conclusion Appendix 3 4 10 11 Executive Summary According to the results of a recent survey conducted by

More information

Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada

Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada Powering Up the Network: A Report on Small Business Use of E-business Solutions in Canada February 2010 Overview Canada is a world leader in many areas: energy, natural resources and the financial services

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Global Cybersecurity Index Good Practices

Global Cybersecurity Index Good Practices AUSTRALIA Global Cybersecurity Index Good Practices LEGAL Australia has acceded to the Council of Europe Convention on Cybercrime. The convention came into force on 1 March 2013. Cybercrime Legislation

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

Sincerely yours, Kathryn Hurford Associate Director, Policy

Sincerely yours, Kathryn Hurford Associate Director, Policy 8 July 2005 Malaysia FTA Taskforce Department of Foreign Affairs and Trade R. G. Casey Building, John McEwen Crescent BARTON ACT 0221 Dear Sir/Madam, Engineers Australia is the peak body for engineering

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Cloud Services in Japan

Cloud Services in Japan Cloud Services in Japan November 2011 Kazutaka NAKAMIZO ICT Strategy Policy Division Global ICT Strategy Bureau Ministry of Internal Affairs and Communications(MIC), JAPAN Size of cloud services 1 - In

More information

Cyber Security Collaboration: A Critical Ingredient for Worldwide Security

Cyber Security Collaboration: A Critical Ingredient for Worldwide Security 1 Cyber Security Collaboration: November 2003 Copyright 2003 Entrust. All rights reserved. Table of Contents 1 Introduction... 1 2 Cyber Security... 1 2.1 Cyber Security: The Vital Link... 1 2.2 Cyber

More information

opinion piece IT Security and Compliance: They can Live Happily Ever After

opinion piece IT Security and Compliance: They can Live Happily Ever After opinion piece IT Security and Compliance: They can Live Happily Ever After Contents Pitfalls, misconceptions and mistakes 01 It s not all doom and gloom 01 Take the right steps towards compliance and IT

More information

Agilent OSS Customer-Centric Service Manager

Agilent OSS Customer-Centric Service Manager Agilent OSS Customer-Centric Service Manager Deliver the high-quality wireless experience your high-value customers demand Agilent OSS Customer-Centric Service Manager (CCSM) provides the end-toend, real-time

More information

Modalities for Cyber Security and Privacy Resilience: The NIST Approach

Modalities for Cyber Security and Privacy Resilience: The NIST Approach Modalities for Cyber Security and Privacy Resilience: The NIST Approach ABSTRACT Janine S. Hiller Virginia Tech jhiller@vt.edu Roberta S. Russell Virginia Tech rrussell@vt.edu Cybersecurity was a major

More information

CYBERSECURITY INDEX OF INDICES

CYBERSECURITY INDEX OF INDICES Published July 2, 2015 CYBERSECURITY INDEX OF INDICES Cybersecurity development is a complex matter. Whether at the nation state level, or in an enterprise, various factors need to be taken into consideration

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

the Council of Councils initiative

the Council of Councils initiative Author: Andrea Renda, Senior Research Fellow, Centre for European Policy Studies May 3, 2013 Editor's note: This brief is a feature of the Council of Councils initiative, gathering opinions from global

More information

Mr. Chairman, Mr. President, distinguished Governors, ladies and gentlemen,

Mr. Chairman, Mr. President, distinguished Governors, ladies and gentlemen, Statement by Mr. Jun AZUMI, Minister of Finance of Japan, at the Forty-Fifth Annual Meeting of the Board of Governors of the Asian Development Bank (Manila, Philippines, May 4, 2012) 1. Introduction Mr.

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

Action Plan for Promoting Trilateral Cooperation among the People's Republic of China, Japan and the Republic of Korea

Action Plan for Promoting Trilateral Cooperation among the People's Republic of China, Japan and the Republic of Korea Japan-China-ROK Trilateral Summit Action Plan for Promoting Trilateral Cooperation among the People's Republic of China, Japan and the Republic of Korea December 13, 2008 Since the 1st Trilateral Summit

More information

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce

Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House

More information

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:

Testimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing: Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony

More information

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures For discussion on 12 June 2000 Legislative Council Panel on Information Technology and Broadcasting Hacking and Virus Activities and Preventive Measures Purpose This paper briefs Members on the common

More information

Future of Minerals Exploration Helping the mining industry go deeper.

Future of Minerals Exploration Helping the mining industry go deeper. Future of Minerals Exploration Helping the mining industry go deeper. WWW.WIPRO.COM David Lee, GM Strategy- Mining, Wipro Technologies Table of contents 02 Future of Minerals Exploration 03 Minerals Exploration

More information

Promoting Asian Economic & Financial Cooperation

Promoting Asian Economic & Financial Cooperation Promoting Asian Economic & Financial Cooperation Exim Bank s Initiatives Mr. T.C. VENKAT SUBRAMANIAN Chairman & Managing Director Exim Bank of India 1 Introduction 2 International trade & investment vital

More information

Annual Report 2012 6 November, 2012

Annual Report 2012 6 November, 2012 Annual Report 2012 6 November, 2012 2012 was a productive year for the Centre. The Centre continued to develop and promote academic research in contribution to economic and social development of New Zealand

More information

Through a cyber security lens

Through a cyber security lens Through a cyber security lens 2015 Global Audit Survey kpmg.com What the 2015 survey tells us Short of a crisis, the issues on the audit committee s radar don t change dramatically from year to year (and

More information

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap

The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap The Imperative for High Assurance Credentials: State Identity Credential and Access Management (SICAM) Guidance and Roadmap AAMVA Region I Conference E-ID, DLDV, and Privacy Conducting Business Securely

More information

CHINA TAX, ACCOUNTING, AND AUDIT IN 2014-2015. IV. Accounting, Audit and Tax Compliance V. International Taxation

CHINA TAX, ACCOUNTING, AND AUDIT IN 2014-2015. IV. Accounting, Audit and Tax Compliance V. International Taxation TAX, ACCOUNTING, AND AUDIT IN CHINA 2014-2015 I. China s Tax System II. China s Business Taxes III. Individual Income Tax IV. Accounting, Audit and Tax Compliance V. International Taxation Produced in

More information

The Importance of International Services Standardisation in Australia

The Importance of International Services Standardisation in Australia 15 May 2015 Australian Services Exports Productivity Commission Locked Bag 2, Collins Street Melbourne VIC 8003 Productivity Commission Study into Barriers to Growth in Australian Services Exports Standards

More information

How To Protect The Internet From Natural Disasters

How To Protect The Internet From Natural Disasters Network Security Policy: The U.S. Experience Patricia Cooper International Bureau U.S. Federal Communications Commission Network Security: The U.S. Experience Network Security: How we define it U.S. Approach:

More information

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union

ITU GLOBAL CYBERSECURITY AGENDA AND CHILD ONLINE PROTECTION. International Telecommunication Union ASIA-PACIFIC TELECOMMUNITY The Thirteenth South Asian Telecommunications Regulators Council (SATRC-13) Document SATRC-13/INF-03 18 20 April 2012, Kathmandu, Nepal 18 April 2012 ITU GLOBAL CYBERSECURITY

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation

GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000. CEO EDS Corporation GLOBAL BUSINESS DIALOGUE ON ELECTRONIC COMMERCE CYBER SECURITY AND CYBER CRIME SEPTEMBER 26, 2000 Issue Chair: Issue Sherpa: Dick Brown CEO EDS Corporation Bill Poulos EDS Corporation Tel: (202) 637-6708

More information

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems Cloud Security Strategies Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems London, 14 October 2015 UNICREDIT AT A GLANCE Employees: more than 146.600 Branches: 8.403 Banking operations

More information

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample

Frost & Sullivan. http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Frost & Sullivan http://www.marketresearch.com/frost-sullivan-v383/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm EST

More information

2008 Disaster Recovery Research Overview and Key Findings Report

2008 Disaster Recovery Research Overview and Key Findings Report 2008 Disaster Recovery Research Report The Overview The Symantec sponsored 2008 Disaster Recovery Research fourth annual report highlights business trends regarding disaster planning and preparedness.

More information

INSURANCE DEVELOPMENT PLAN Volume II (2010-2014)

INSURANCE DEVELOPMENT PLAN Volume II (2010-2014) INSURANCE DEVELOPMENT PLAN Volume II (2010-2014) 1 PREFACE The Insurance industry plays a significant role in the social and economic development of a nation, serving as a contributing source of long-

More information

The Cyber Security Leap: From Laggard to Leader. April 2015

The Cyber Security Leap: From Laggard to Leader. April 2015 The Cyber Security Leap: From Laggard to Leader April 2015 How do some organizations achieve better security performance? We compared organizations that were able to leapfrog their security effectiveness

More information

Leadership Competencies for Healthcare Services Managers

Leadership Competencies for Healthcare Services Managers Leadership Competencies for Healthcare Services Managers Leadership Competencies for Health Services Managers 1 This document is the result of a global consortium for healthcare management that has work

More information

2013 Frost & Sullivan Japan Market Leadership Award Workforce Management Market

2013 Frost & Sullivan Japan Market Leadership Award Workforce Management Market 2013 Frost & Sullivan Japan Market Leadership Award Workforce Management Market 2013 Frost & Sullivan Japan Market Share Leadership Award in the Workforce Management Market Overview of Asia Pacific Contact

More information

Legislative Language

Legislative Language Legislative Language SECTION 1. DEPARTMENT OF HOMELAND SECURITY CYBERSECURITY AUTHORITY. Title II of the Homeland Security Act of 2002 (6 U.S.C. 121 et seq.) is amended (a) in section 201(c) by striking

More information

Challenges for Capital Market Development in Asia

Challenges for Capital Market Development in Asia Challenges for Capital Market Development in Asia Osaka, 30 October 2014 Masamichi Kono Vice Minister for International Affairs President, Asian Financial Partnership Center Financial Services Agency,

More information

Global Deployment of IT Solutions that Contribute to Social Progress

Global Deployment of IT Solutions that Contribute to Social Progress Hitachi Review Vol. 63 (2014), No. 6 315 Overview Global Deployment of IT Solutions that Contribute to Social Progress Sunao Ehara Wakana Kasai Isamu Nishikawa Shinichi Matsuoka SOLUTIONS THAT TIE TOGETHER

More information

Cyber Security Strategy for Germany

Cyber Security Strategy for Germany Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable

More information

Policies and Practices on Network Security of MIIT

Policies and Practices on Network Security of MIIT 2011/TEL43/SPSG/WKSP/004 Policies and Practices on Network Security of MIIT Submitted by: China Workshop on Cybersecurity Policy Development in the APEC Region Hangzhou, China 27 March 2011 Policies and

More information

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts

More information

The Southeast Asia Data Centre Market A look at new players and key drivers as well as the opportunities and challenges in Asia

The Southeast Asia Data Centre Market A look at new players and key drivers as well as the opportunities and challenges in Asia The Southeast Asia Data Centre Market A look at new players and key drivers as well as the opportunities and challenges in Asia Ronald van Kleunen CEO Globeron (ronald@globeron.com) Philip Low CEO BroadGroup

More information

How To Write A National Cybersecurity Act

How To Write A National Cybersecurity Act ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses

More information

2015 VORMETRIC INSIDER THREAT REPORT

2015 VORMETRIC INSIDER THREAT REPORT Research Conducted by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security RETAIL EDITION #2015InsiderThreat RESEARCH BRIEF RETAIL CUSTOMERS AT RISK ABOUT THIS RESEARCH BRIEF

More information