ATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013

Size: px
Start display at page:

Download "ATM Security Training Middle East Riyadh, Saudi Arabia 23 rd & 24 th February 2013"

Transcription

1 ATM Security Training Middle East Riyadh, Saudi Arabia There are now over 2 million ATM s in use globally according to the ATM Industry Association and a recent report by RBR estimates that there will be nearly 3 million ATMs worldwide by The European ATM Security Team (EAST), which represents 29 ATM networks and deployers across Europe, reported over nine thousand ATM related fraud attacks with losses reaching 131 million in the first six months of 2012 with ( 128 million caused by card skimming with the remaining distributed amongst card trapping, cash trapping and transaction reversal fraud). The majority of these losses are occurring outside Europe in countries where the EMV liability shift has not yet been adopted, or where the roll out of EMV compliant ATMs has not yet been completed. It is apparent that, as card and electronic payments business evolves, opportunities are readily available to fraudsters to exploit loopholes in security controls. The Science and Knowledge Consultancy and Training Institute (SKCTI) is proud to bring to Saudi Arabia one of the best ATM Security Trainings in the world to address this concern. The ATM Security Training is the first industry recognized course of its kind globally having been attended to-date by over 200 financial institutions across EMEA. Developed by LiquidNexxus in collaboration with industry stakeholders and subject-matter experts, the training covers key security issues affecting ATM s from both physical and logical perspectives focusing on increasing knowledge of ATM fraud as well key recommendations for proactive protection at each stage of the ATM Lifecycle. Covering all industry stakeholders. enhanced with contributions from experts, real life case studies, exercises and additional resources. The course is reviewed and updated regularly to reflect latest updates. The ATM Security Training Middle East will be adapted to focus on regional issues with contributions from experts, case studies, and discussion panels. Objectives Increase attendees awareness of methods of ATM Fraud Drive adoption of proactive industry best practices from installation through maintenance and decommissioning Understand the logical device security flaws affecting ATM s as well as measures that can be employed to reduce risks Interact and learn from security experts and peers Who Should Attend? Training is suitable for executives with the following responsibilities ATM Management IT Security Security Network Engineers Fraud Prevention Service Personnel Branch/Physical Security Network Engineers Service Personnel Installers and Maintenance IT Risk CIT and generally anyone with an interest in improving overall understanding of ATM Fraud countermeasures.

2 Agenda Training last for two days and will commence 09:00 and finish approximately 17:00 and covers: Context & Introductions ATM Lifecycle Security ATM Overview ATM Stakeholders ATM Definitions & Scope ATM Components ATM Threats: Context & Statistics Fraud Overview Global ATM Fraud Survey Emerging Threats Risk Management Risk Assessment Countermeasure Action Strategy Insurance Site Validation ATM Physical Security Onsite Monitoring Positioning & Anchorage Installation and Servicing Recommended Measures Control & Monitoring ATM Bombings & Gas Attacks Brute Force Attacks PIN & Encryption Security PIN Security Recommendations Key Management from Loading to Destruction ATM Cyber Security ATM Cyber Attack Vectors ATM Malware Analysis ATM Software Environment & Lifecycle Security ATM & PCI Compliance Monitoring & Administration ATM Account Security Cybercrime Overview Data Compromise & Hacking Underground Markets Carders Forums ATM Cash Security Cash Replenishment Security Recommendations Merchant/CIT/Branch Fill Safe Operating Procedures Securing ATM Zones Cash Trapping ATM Skimming Definitions Overview Skimming Devices & Classification Latest Skimming Devices Countermeasure Recommendations Card Trapping Definition & Nature of Trapping Scams & Types of Devices Detection & Deterrence Solutions

3 ATM Data & Transactional Security Messaging Security Confidentiality & Integrity Transaction Reversal Fraud Cash Trapping Impact Trainers ATM Security Training Riyadh, Saudi Arabia Education Staff Education Customer/Consumer Education ATM War Exercise Each training session is attended by specialist trainers with years of experience in Security and managing ATM s. In addition where possible we invite guest speakers from local law enforcement, regulators, CIT companies, solution providers and specialists to discuss mitigation of ATM Fraud, and ATM Management best practices Lachlan Gunn ATM Security Expert Director of BenAlpin Ltd which he founded in July 2000 as a UK based independent consultancy providing commercial security advice to businesses. An extensive career in the British Armed Forces Managed several commercial security companies and has a strong background in risk management, mainly relating to the transportation, storage and processing of cash. He has worked in Belgium; Croatia; India; Indonesia; Hong Kong; Malaysia; the Netherlands; Singapore; Spain; Taiwan; Thailand; the United Kingdom amongst other locations Co-founder, Coordinator and a Director of European ATM Security Team Ltd (EAST) which gathers and provides information for the European ATM industry and facilitates effective representation of ATM related security issues at relevant European central institutions. EAST was founded in 2004 and has representation from 29 Countries. Member of the following professional organisations: The Institute for Independent Business (IIB) and the ATM Industry Association (ATMIA). Peter Freeman, Self Service Specialist Qualified as a Banker with AIB certification Mr Freeman has a wealth of experience in ATMs, and general knowledge of Self Service solutions in the financial industry that can help banks across the globe, he also has experience in security; this involves understanding crimes around selfservice and cards, and recommending protection solutions. Qualified as a Banker with AIB certification Mr Freeman has a wealth of experience in ATMs, and general knowledge of Self Service solutions in the

4 financial industry that can help banks across the globe, he also has experience in security; this involves understanding crimes around self-service and cards, and recommending protection solutions. After leaving school Peter joined a small London bank, (part of a larger group) with a career in banking in mind. He carried out did many jobs in clearing and payments, branch, and worked in dealing. Later Peter progressed to Systems and IT and started a career that involved programming punched card machines and also computers. (A complete reader/sorter in and out clearing program in 256K!). Later in his career he moved into general systems looking at operations and was involved in the early cash dispenser (hardly ATMs as we know them today) deployment in After a brief period in the public sector Peter joined NCR UK in 1978 looking at new systems and potential deployment in the financial industry. These included some early ATM deployments, smart card solutions in France and early cheque imaging solutions. While generally within the wide product management spectrum, he was involved in product development of ATMs; also early kiosk and ticketing solutions. Peter has been involved with early ATM deployments across the globe working with local NCR organisations and customers to provide the best solutions. Recent projects were focused on emerging markets in Middle East, Africa, Eastern Europe and Asia as well as product development in Japan. Registration Information Training places for this course are in high demand and only available on a first come first serve basis, book early to avoid disappointment Standard Registration includes: > Access to the full 2 day training session > Hard copy Training Manual > Refreshments, Buffet Lunch & Coffee on both days > Certificate of Completion Cost: $ 1,500 or SAR 5,650 Group discounts: additional 10% if 3 or more delegates register from the same organization. Venue: To be announced shortly Enquiries Training is conducted by LiquidNexxus, SKCTI and consultant trainers, please contact us for more information: For registrations from within Saudi Arabia and the Middle East please contact SKCTI: Dr. Saleh A. Sonbul, CEO dralsonbul@skctc.com / Phone: (Direct) (Mobile) OR Mohammad Nasir, Training Operations training@skctc.com / Phone: Ext110 For registrations from anywhere else please contact LiquidNexxus: Marc Casadio, Regional Director mcasadio@liquidnexxus.com Phone:

5 About SKCTI The Science and Knowledge Consultancy and Training Institute or SKCTI is a Saudi-authorized developmental education and training service-provider, with training headquarters located, and operating, in Riyadh, organized under the laws of the Kingdom of Saudi Arabia, recognized by the Ministry of Education (MOE) and under the supervision of the Saudi Technical and Vocational Training Corporation (TVTC) having its mailing address as P.O. Box Riyadh 11447, Saudi Arabia. We are privileged and excited to timely share and offer this ATM Security Training to the local Saudi communities to bring local awareness to the global standards in card and electronic payments business security controls - under very competitive training prices. SKCTI also provides training services in its seventeen (17) training domains with focus in the areas of Financial and Investment, ISO-based Management Systems, Business Management and Improvement, Human Resources Development, Information and Communications Technology, and in the English Language Communication Skills. We are also conducting exam-preparation trainings for different levels of international certifications and designations given by recognized international certification bodies which include, but not limited to, Chartered Financial Analyst CFA, Capital Market Exams CME, Certified Management Accountant CMA, and IRCA/RABQSA Auditor/Lead Auditor for ISO-based management systems. SKCTI also provide top notch consultancy, auditing, and training services including ISO standards and widely used quality systems. Here at the institute, we provide Internal Auditor and Lead Auditor training courses, certified from RABQSA & IRCA at the following standards: ISO 9001:2008 QMS Quality Management System, ISO EMS Environmental Management System, OHSAS Occupational Health Safety Management System, ISO FSMS Food Safety Management System, ISO/IEC ISS Information Security System, ISO/IEC LQMS Laboratory Quality Management System, among others. Our training institute also gives trainings in ILM-endorsed Business Management (BM) like the ILM (Institute of Leadership and Management (City & Guilds of London Institute, UK) s Project Management Programme, Leadership and Management, and Sales Management Programme. Aside from that, SKCTI also offers Business Improvement (BI) programmes like the Lean Six Sigma and Balanced Score Card, among others. Most of our trainings are customizable and offer flexible timings and venues. We cater both for corporate, including major vertical industries, and individual clients both in-house and public. SKCTI would like to bring regular, sustainable, international-quality-standard, and globallycompetitive training programs to the local learning communities of Saudi Arabia like this coming ATM Security Training in order bring local awareness to the global standards. We hope to offer the value of our dedicated services and vast experience in quality trainings in return if given the trust and the opportunity to be a training provider to your organization. For more details, kindly visit our website at

6 About LiquidNexxus LiquidNexxus is a specialised training, education and consulting company focused on the payment and electronic card industry as well as key areas including risk, security, and corporate governance. Since LiquidNexxus was founded in July 2009 we have had the pleasure of working with many organisations throughout EMEA. For more information on our courses, portfolio and services please visit the website: nexxus.com

ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR

ISO 9001:2015 QUALITY MANAGEMENT SYSTEMS AUDITOR/LEAD AUDITOR Knowledge RECOGNITION Skills retention Further excellence behaviour Ability COMPETENCE QUALIFICATION ISO 9001 Training services SGS ACADEMY www.sgs.com sgs academy transforming people and businesses As

More information

opinion piece Eight Simple Steps to Effective Software Asset Management

opinion piece Eight Simple Steps to Effective Software Asset Management opinion piece Eight Simple Steps to Effective Software Asset Management Contents Step 1: Collate your licence agreements 01 Step 2: Determine your actual licence position 01 Step 3: Understand your existing

More information

360 o View of. Global Immigration

360 o View of. Global Immigration 360 o View of Global Immigration In a fast moving global economy, remaining compliant with immigration laws, being informed and in control is more challenging than ever before. We are a globally linked

More information

Governance, Risk and Compliance Assessment

Governance, Risk and Compliance Assessment Governance, Risk and Compliance Assessment Information security is a pervasive business requirement and one that no organisation can afford to get wrong. If it s not handled properly, your business could

More information

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise Udyen Jain & Associates Quality and expertise that you deserve OCA, Organisation Conseil Audit Your vision, our expertise Mikaël Ouaniche Mikaël Ouaniche is a Chartered Accountant and Legal Auditor, Graduate

More information

opinion piece IT Security and Compliance: They can Live Happily Ever After

opinion piece IT Security and Compliance: They can Live Happily Ever After opinion piece IT Security and Compliance: They can Live Happily Ever After Contents Pitfalls, misconceptions and mistakes 01 It s not all doom and gloom 01 Take the right steps towards compliance and IT

More information

Professional Certificate in Ethics and Anti-Corruption Compliance

Professional Certificate in Ethics and Anti-Corruption Compliance in partnership with Professional Certificate in Ethics and Anti-Corruption Compliance Maxwell Chambers, Singapore, November 18th & 19th 2015 Enhance & develop your understanding of Ethics & Compliance

More information

How To Manage An Ip Telephony Service For A Business

How To Manage An Ip Telephony Service For A Business Enabling organisations to focus on core revenue generating activities Your business needs reliable, flexible and secure communication tools to enable better connectivity and collaboration with your employees,

More information

Trends in Off-Site ATMs Market 13,OCT, 2008

Trends in Off-Site ATMs Market 13,OCT, 2008 Trends in Off-Site ATMs Market 13,OCT, 2008 Contents Trend in Off-Site ATMs IAD Market Off-Site Locations Off-Site Markets and Driving Factors Business Models Strategy for IADs and Banks Conclusion Global

More information

Singaporean exports set to accelerate due to Asian economic rebound and global trade agreements coming online

Singaporean exports set to accelerate due to Asian economic rebound and global trade agreements coming online News Release 29 May 2015 Singaporean exports set to accelerate due to Asian economic rebound and global trade agreements coming online ** Singapore expected to see one of the highest trade growth rates

More information

JEDDAH, KSA JANUARY 17-21. Organized by UBT University of Business and Technology and CEC Continuous Education Center in partnership with Leoron PDI

JEDDAH, KSA JANUARY 17-21. Organized by UBT University of Business and Technology and CEC Continuous Education Center in partnership with Leoron PDI JANUARY 17-21 JEDDAH, KSA Time: Location: Program language: Expert consultant: 9:00 am to 5:00 pm University of Business & Technology Continuing Education Center King Road Tower 2701, 27th Floor Malik

More information

IP Trading Solutions

IP Trading Solutions In many mature financial organisations, middle-and back-office functions already collaborate via high-quality, well-integrated voice and video traffic. Their trading floors, on the other hand, still operate

More information

Security Assessment and Compliance Services

Security Assessment and Compliance Services Security Assessment and Compliance Services Despite the best efforts of IT security teams, hackers and malicious code continue to find their way into corporate networks. Adding to the pressure is the fact

More information

Exploring the Landscape of Philippine Cybersecurity

Exploring the Landscape of Philippine Cybersecurity Exploring the Landscape of Philippine Cybersecurity Understanding the Risk and Taking Appropriate Steps to Mitigate Cybersecurity Threats Freddy Tan, CISSP Chairperson, (ISC)² Board of Directors Copyright

More information

Rouse. The right mix of intellectual property specialists. www.rouse.com

Rouse. The right mix of intellectual property specialists. www.rouse.com Rouse The right mix of intellectual property specialists www.rouse.com Welcome to Rouse A leading global intellectual property firm. Established in 1990, we now have a team of more than 600 (including

More information

It s critical to be able to correlate threats pre-emptively and respond to them immediately.

It s critical to be able to correlate threats pre-emptively and respond to them immediately. Security has become a much deeper executive discussion because of the modern diversity of channels through which businesses can be attacked. Mobility, bring your own device, virtualisation, the cloud,

More information

TRAINING BROCHURE 2015

TRAINING BROCHURE 2015 CHAMBER CERTIFICATION ASSESSMENT SERVICES LIMITED TRAINING BROCHURE 2015 For the last 20 years, Chamber Certification Assessment Services Limited has been providing highly professional, quality training

More information

C L A R I D E N 19 21 August 2014

C L A R I D E N 19 21 August 2014 C L A R I D E N 19 21 August 2014 Knowledge for the world business leaders Shangri-La Hotel, Jakarta, Indonesia Certified Human Resource Manager (CHRM) TM CHRM is certified by the International Academy

More information

The PCI Security Standards Council. Bob Russo June 2011

The PCI Security Standards Council. Bob Russo June 2011 The PCI Security Standards Council Bob Russo June 2011 What are the threats to card data? How can you defend your card data? What is the Council doing to help you? What tools are available to get you secure?

More information

REGISTER AT IIF.COM/TRAINING

REGISTER AT IIF.COM/TRAINING IIF EXECUTIVE PROGRAM ON PRIVATE BANKING AND WEALTH MANAGEMENT Evolving Wealth Transformation in Dynamic Growth Markets November 16-17, 2015 Singapore IN COOPERATION WITH COURSE DESCRIPTION IIF EXECUTIVE

More information

Seizing Opportunities in Asia and Beyond

Seizing Opportunities in Asia and Beyond Seizing Opportunities in Asia and Beyond Asia, the region of growth opportunities 30% Projected contribution from Asia (excluding Japan) to global GDP in 2020. Today, Asia is the world s fastest growing

More information

Sustainable Solutions. Switch to future thinking

Sustainable Solutions. Switch to future thinking Switch to future thinking Increased global competition, rapid advances in technology, risks from natural disasters, resource shortages today s business leaders must adapt to operating in a changing world,

More information

best practice guide The Three Pillars of a Secure Hybrid Cloud Environment

best practice guide The Three Pillars of a Secure Hybrid Cloud Environment best practice guide The Three Pillars of a Secure Hybrid Cloud Environment best practice guide The Three Pillars of a Secure Hybrid Cloud Environment Introduction How sound risk management, transparency

More information

Cyber Threat Summit Brochure

Cyber Threat Summit Brochure 2012 Cyber Threat Summit Brochure The European Cyber Threat Summit will be held over two days in Dublin. The syllabus will be delivered by over 20 of the world s leading cyber security experts with a specific

More information

Security for the Cloud of Clouds

Security for the Cloud of Clouds Security for the Cloud of Clouds Ramy Houssaini. Vice President, BT Security Europe. RamyHoussaini strategicleadership About BT Security BT s end to end Security portfolio integrates classic perimeter

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Managed Service for Visual Communications

Managed Service for Visual Communications Managed Service for Visual Communications Managed Service for Visual Communications Videoconferencing can have multiple benefits in your organisation. It can help your employees be more productive and

More information

Deutsche Bank Global Transaction Banking. Securities Services. Overview

Deutsche Bank Global Transaction Banking. Securities Services. Overview Deutsche Bank Global Transaction Banking Direct Securities Services Securities Services Overview Finding the right custodian with a long-term commitment to supporting its clients business is critical for

More information

Contact Centre Integration Assessment

Contact Centre Integration Assessment Contact Centre Integration Assessment How well are your business objectives aligned with the right contact centre technologies? Knowing how the technology in your contact centre supports service delivery

More information

DYNAMIC HEDGING ESSENTIALS, MASTER CLASS AND WORKSHOP

DYNAMIC HEDGING ESSENTIALS, MASTER CLASS AND WORKSHOP DYNAMIC HEDGING ESSENTIALS, MASTER CLASS AND WORKSHOP Chicago, Illinois August 8 9, 2013 About the course Tremendous advances have been made in the last few years in the area of dynamic hedging of variable

More information

ABOUT CMCS. So f t wa r e

ABOUT CMCS. So f t wa r e ABOUT CMCS CMCS provides fully integrated, 360, sustainable, quality Project Portfolio Management (PPM) solutions helping clients across all industries to identify, prioritize, select and deliver all projects

More information

Understanding the 12 Requirements of PCI DSS

Understanding the 12 Requirements of PCI DSS opinion piece Understanding the 12 Requirements of PCI DSS Practical steps to achieve and maintain compliance Regardless of whether you are a retailer, service provider or a bank, if you process any form

More information

Institution of Occupational Safety & Health Managing Safely Course

Institution of Occupational Safety & Health Managing Safely Course Institution of Occupational Safety & Health Managing Safely Course Duration of Course: 4 Days Registration Fee: 10,000 Total Course Fee: 40,000 Course Date: May 26-29, 2014 Venue: Islamabad Embassy Road

More information

ISO27032 Guidelines for Cyber Security

ISO27032 Guidelines for Cyber Security ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance

More information

opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive

opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive opinion piece Fragmenting DLP assessment, implementation, and management is counter-intuitive Contents Introduction 01 Having the cake and eating it 01 Holistic = end to end 01 The devil is in the detail

More information

Caribbean Electronic Payments

Caribbean Electronic Payments Caribbean Electronic Payments Company Profile Caribbean Electronic Payments Ltd. 1-13 Contents Introduction... 3 Mission & Core Values... 5 CEPAYMENTS Mission... 5 Our Core Values... 5 Innovation... 5

More information

Consulting and Professional Services. Strategic, architectural, operational and implementation expertise

Consulting and Professional Services. Strategic, architectural, operational and implementation expertise Consulting and Professional Services Strategic, architectural, operational and implementation expertise How do you ensure the seamless integration of new and existing technologies and services not just

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

MANAGED SERVICES ACCELERATE THE MOVE TO NEW MODELS AND TECHNOLOGIES

MANAGED SERVICES ACCELERATE THE MOVE TO NEW MODELS AND TECHNOLOGIES MANAGED SERVICES ACCELERATE THE MOVE TO NEW MODELS AND TECHNOLOGIES Overview for Customers Date AGENDA 1. Market trends and enterprise challenges 2. The value of Alcatel-Lucent Enterprise Managed Services

More information

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza

Information Security Management System (ISMS) Overview. Arhnel Klyde S. Terroza Information Security Management System (ISMS) Overview Arhnel Klyde S. Terroza May 12, 2015 1 Arhnel Klyde S. Terroza CPA, CISA, CISM, CRISC, ISO 27001 Provisional Auditor Internal Auditor at Clarien Bank

More information

Global AML Resource Map Over 2000 AML professionals

Global AML Resource Map Over 2000 AML professionals www.pwc.co.uk Global AML Resource Map Over 2000 AML professionals January 2016 Global AML Resources: Europe France Italy Jersey / Guernsey 8 Ireland 1 Portugal 7 Luxembourg 5 United Kingdom 1 50 11 Spain

More information

The Value of Information Security Certifications

The Value of Information Security Certifications The Value of Information Security Certifications Ed Zeitler, CISSP Executive Director, (ISC) 2 www.isc2.org Overview Why professional certificate for information security? About (ISC) 2 and its credentials

More information

Professional Personal Tenacious Intelligent Innovative Objective Consistent Proactive Flexible Successful

Professional Personal Tenacious Intelligent Innovative Objective Consistent Proactive Flexible Successful Professional Personal Tenacious Intelligent Innovative Objective Consistent Proactive Flexible Successful Contents Introduction Overview of our Services - Advertised Selection - Search - Database UK Base

More information

Bureau of Standards Jamaica Quarterly Training Schedule July - September 2015

Bureau of Standards Jamaica Quarterly Training Schedule July - September 2015 Bureau of Standards Jamaica Quarterly Training Schedule July - September 2015 () The mission of the BSJ Training unit is to promote a culture of quality within the Jamaican society, by providing high and

More information

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning

Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.

More information

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon

U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon U.S. Smart Card Migration: Stripe to EMV Claudia Swendseid, Federal Reserve Bank of Minneapolis Terry Dooley, SHAZAM Kristine Oberg, Elavon UMACHA Navigating Payments 2014 October 8, 2014 Who We Are Claudia

More information

E-Seminar. Financial Management Internet Business Solution Seminar

E-Seminar. Financial Management Internet Business Solution Seminar E-Seminar Financial Management Internet Business Solution Seminar Financial Management Internet Business Solution Seminar 3 Welcome 4 Objectives 5 Financial Management 6 Financial Management Defined 7

More information

MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries

MEDIA RELEASE. IOSCO reports on business continuity plans for trading venues and intermediaries IOSCO/MR/54/2015 Madrid, 22 December 2015 IOSCO reports on business continuity plans for trading venues and intermediaries The Board of the (IOSCO) today published two reports that seek to enhance the

More information

The face of consistent global performance

The face of consistent global performance Building safety & security global simplified accounts The face of consistent global performance Delivering enterprise-wide safety and security solutions. With more than 500 offices worldwide Johnson Controls

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Brochure More information from http://www.researchandmarkets.com/reports/1339929/

Brochure More information from http://www.researchandmarkets.com/reports/1339929/ Brochure More information from http://www.researchandmarkets.com/reports/1339929/ The 2011 World Forecasts of Machine Tools That Remove Material by Laser or Light, Photon, Ultrasonic, Electro-Discharge,

More information

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Cyber Security. A professional qualification awarded in association with University of Manchester Business School ICA Advanced Certificate in Cyber Security A professional qualification awarded in association with University of Manchester Business School An Introduction to the ICA Advanced Certificate In Cyber Security

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Security Consulting. Services Overview

Security Consulting. Services Overview Services Overview Dimension Data is a global technology services company, assisting its customers in planning, building and supporting their IT infrastructures. Dimension Data combines its expertise in

More information

Cloud Readiness Consulting Services

Cloud Readiness Consulting Services Cloud Readiness Consulting Services Globalisation and economic pressures are changing the business landscape, increasing the pressure to expedite time-to-market with new products and services, while keeping

More information

Dimension Data s Uptime Maintenance Service

Dimension Data s Uptime Maintenance Service Dimension Data s Uptime Maintenance Service The pace of business today simply doesn t allow for downtime. When systems go off-line, productivity drops, time and money go to waste and opportunities are

More information

Agenda. Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE

Agenda. Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE Agenda Emphasized text to show one more strong point on this slide TAKE-AWAY MESSAGE INTRACOM Group Core Companies MARKET POSITION A leading regional telecommunications systems manufacturer and solutions

More information

QFBS WAIVE TRANSACTION FEE ON SHARED ATM NETWORK - atm 5

QFBS WAIVE TRANSACTION FEE ON SHARED ATM NETWORK - atm 5 QFBS WAIVE TRANSACTION FEE ON SHARED ATM NETWORK - atm 5 4 April 2006, Singapore - In a move to provide greater convenience, the five Qualifying Full Banks (QFBs) - ABN AMRO, Citibank, HSBC, Maybank and

More information

Cloud Services for Microsoft

Cloud Services for Microsoft The success of your business depends on your ability to adapt to a dynamic market environment, where globalisation and economic pressures are reshaping the landscape. To remain competitive, your organisation

More information

Dimension Data s Uptime Support Service

Dimension Data s Uptime Support Service Dimension Data s Uptime Support Service As more technology enters the world, and is introduced into organisations, the typical IT environment increases in complexity. Businesses require higher levels of

More information

advantedge Services advantedge Microsoft Dynamics AX Services for ISVs, VARs and existing AX users Africa Asia-Pac Europe North America South America

advantedge Services advantedge Microsoft Dynamics AX Services for ISVs, VARs and existing AX users Africa Asia-Pac Europe North America South America advantedge Services SAGlobal advantedge Microsoft Dynamics AX Services for ISVs, VARs and existing AX users Africa Asia-Pac Europe North America South America About SAGlobal SAGlobal is the largest specialist

More information

Global Student Mobility 2025 Forecasts of the Global Demand for Pathways to Higher Education in the Schools, VET and ELICOS sectors

Global Student Mobility 2025 Forecasts of the Global Demand for Pathways to Higher Education in the Schools, VET and ELICOS sectors Global Student Mobility 2025 Forecasts of the Global Demand for Pathways to Higher Education in the Schools, VET and ELICOS sectors Andrew Hewett IDP Education Australia Agenda and Key Issues Pathways

More information

Cloud Readiness Workshop

Cloud Readiness Workshop Globalisation and economic pressures are changing the business landscape, increasing the pressure to expedite time-to-market with new products and services, while keeping costs down. In addition, for many

More information

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure

Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis. Training Brochure Application Security Audit Fault Injection Model, Fuzz Generators & Static Code Analysis Training Brochure Synopsis This Four-day practical training is designed for Information Systems auditors, application

More information

Targeting the problem together

Targeting the problem together 18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Hosted Web Security Web Security Gateway Web Security Web Filter Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content even

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Some 4 500 organizations implement ISO/IEC 27001. Information security INTERNATIONAL

Some 4 500 organizations implement ISO/IEC 27001. Information security INTERNATIONAL Some 4 500 organizations implement ISO/IEC 27001 for information security The author reports on global progress in the implementation of the international information security management system standard

More information

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015

Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 Unisys Security Insights: Global Summary A Consumer Viewpoint - 2015 How consumers in 12 countries feel about: Personal data security, ranked by industry Region-specific security perceptions Research by

More information

Cyber Security solutions

Cyber Security solutions Cyber Security solutions The scenario IT security has become a highly critical issue for all businesses as a result of the growing pervasiveness and diffusion of ICT technology. Risks can arise both inside

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Best Practices for a BYOD World

Best Practices for a BYOD World Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile

More information

Training courses for charity trustees

Training courses for charity trustees Training courses for charity trustees Programme for Autumn 2014 Spring 2015 Presented by: chartered accountants & tax advisers in association with WETSK Limited, company number: 6993455 Overview This series

More information

Hedge Funds Education Seminar

Hedge Funds Education Seminar Hedge Funds Education Seminar Tuesday, 18 October 2005 PLAZA Conference Centre 35/F Central Plaza, 18 Harbour Road Hong Kong A unique opportunity to learn about the fundamentals of investing in Hedge Funds

More information

Visa Inc. PIN Entry Device Requirements

Visa Inc. PIN Entry Device Requirements Visa Inc. PIN Entry Device Requirements The following information is applicable for Visa Inc. regions. Visa Inc. regions include Asia-Pacific (AP); Central and Eastern Europe, Middle East and Africa (CEMEA);

More information

Four steps to improving cloud security and compliance

Four steps to improving cloud security and compliance white paper Four steps to improving cloud security and compliance Despite the widespread proliferation of cloud computing, IT decision makers still express major concerns about security, compliance, and

More information

Certificate In Healthcare Strategy And Strategic Planning

Certificate In Healthcare Strategy And Strategic Planning Certificate In Strategy And Strategic Planning Practical Tools For Developing And Executing Strategic Plans And Business Cases 5 Main Learning Objectives 1. Hands on, interactive learning experience using

More information

An introduction to the World Federation of Occupational Therapists (WFOT)

An introduction to the World Federation of Occupational Therapists (WFOT) An introduction to the World Federation of Occupational Therapists (WFOT) WHAT IS THE WORLD FEDERATION OF OCCUPATIONAL THERAPISTS? The key international representative for occupational therapists and occupational

More information

Microsoft Voucher Ordering Processes

Microsoft Voucher Ordering Processes Microsoft Voucher Ordering Processes *For purposes of this document, the term Member applies to all Microsoft Members, Academic, ITA and Learning partners. Pearson VUE Voucher Store The Pearson VUE Voucher

More information

Comment from past participant

Comment from past participant Project Financing - An Evaluation of Cashflows and Risks Analysis Comment from past participant I am not in the banking industry and I joined the Project Financing seminar to see how banks deal with project

More information

CANADIANS NOT TAKING ADVANTAGE OF RETIREMENT PLANNING PREMIUM HSBC STUDY REVEALS

CANADIANS NOT TAKING ADVANTAGE OF RETIREMENT PLANNING PREMIUM HSBC STUDY REVEALS Abc 30 May 2011 CANADIANS NOT TAKING ADVANTAGE OF RETIREMENT PLANNING PREMIUM HSBC STUDY REVEALS A global survey from HSBC revealed today that those who have a financial plan in place enjoy a clear planning

More information

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008 Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities

More information

ISO 9001 Quality Management System Lead Auditor Training (IRCA)

ISO 9001 Quality Management System Lead Auditor Training (IRCA) ISO 9001 Quality Management System Lead Auditor Training (IRCA) Course Description BSI s Quality Management Systems (QMS) Auditor/Lead Auditor Training Course (ISO 9001) course teaches the principles and

More information

Email Retention. A Workshop on Email Retention Policies:- The risks, possible approaches and implementation issues

Email Retention. A Workshop on Email Retention Policies:- The risks, possible approaches and implementation issues Introduction Most inter- and intra-business communication takes place by email. The bases for critical decisions and contractual agreements are often only documented in email. Courts both in Europe and

More information

SUPPLEMENTAL EXECUTIVE RETIREMENT PLANS IN CANADA

SUPPLEMENTAL EXECUTIVE RETIREMENT PLANS IN CANADA HEALTH WEALTH CAREER SUPPLEMENTAL EXECUTIVE RETIREMENT PLANS IN CANADA KEY FINDINGS FROM THE MERCER SERP DATABASE (2014 UPDATE) APRIL 2015 b CONTENTS 1. Introduction...2 2. Highlights of the Mercer SERP

More information

3 Steps to Transform your Business with Next-Generation Networking

3 Steps to Transform your Business with Next-Generation Networking e-guide The Wireless Revolution 3 Steps to Transform your Business with Next-Generation Networking Welcome to the era of the Wireless Revolution! With easy access to technology, setting up a wireless network

More information

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis

Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?

More information

Stratagem financial school COURSE OFFERED CFPCM Certified Financial Planner What is Financial Planning? Financial planning is the process of meeting one s life goals through proper management of finances.

More information

2010 Critical Thinker Series

2010 Critical Thinker Series Malaysian Organisation of Pharmaceutical Industries (MOPI) & PharmEng Technology Presents cgmp Case Studies a T rra ini ing i P rrog rram ffo rr cgmp P rro ffe ss ss ionai l ss 2010 Critical Thinker Series

More information

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security

Websense Web Security Solutions. Websense Web Security Gateway Websense Web Security Websense Web Filter Websense Express Websense Hosted Web Security Web Security Gateway Web Security Web Filter Express Hosted Web Security Web Security Solutions The Approach In the past, most Web content was static and predictable. But today s reality is that Web content

More information

Course Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence...

Course Schedule. All in one place. Your guide to mapping your training-plan for the second half of 2015 with confidence... July - December 201 Course Schedule All in one place Your guide to mapping your training-plan for the second half of 201 with confidence... www.globalknowledge.com.sa www.globalknowledge.com.eg www.globalknowledge.ae

More information

How To Get A New Phone System For Your Business

How To Get A New Phone System For Your Business Cisco Phone Systems Telemarketing Script Cold Call 1. Locate Contact: Name listed Owner General Manager / Office Manager Chief BDM (Business Decision Maker) Note: Avoid talking to IT since this is not

More information

September 20, 2013 Senior IT Examiner Gene Lilienthal

September 20, 2013 Senior IT Examiner Gene Lilienthal Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank

More information

AACSB International Accreditation and Joint Programs

AACSB International Accreditation and Joint Programs AACSB International Accreditation and Joint Programs Lucienne Mochel Assistant Vice President for Accreditation Services The AACSB Mission To advance quality management education worldwide through accreditation

More information

Understanding corporate statements

Understanding corporate statements Understanding corporate statements 3 March 2015, London Analysing corporate performance Academy Who we are The educational model of the Academy is that of a "Corporate University" where the traditional

More information

ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor

ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor ISO 9001:2015 Management System Training ISO 9001:2015 QMS Lead Auditor Cavendish Scott, Inc. 984 S. Vine St. Denver, CO. 80209 Tel. 303 480 0111 www.cavendishscott.com training@cavendishscott.com Course

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

CSP-4225 Cyber Security Professional Certification The Most demanding, depth and advanced of all...

CSP-4225 Cyber Security Professional Certification The Most demanding, depth and advanced of all... CSP-4225 Cyber Security Professional Certification The Most demanding, depth and advanced of all... Now, You can also learn with the EASE CSP (Cyber Security Profesional) Certification The most Demanding,

More information

Brochure Software Asset Management Essentials

Brochure Software Asset Management Essentials Brochure Software Asset Management Essentials About Pink Elephant Company History Pink Elephant started life some 30 years ago in Delft University in the Netherlands. A beer and peanuts company managed

More information