1 PROGRAMME 14 April Lunch / Delegates Registration Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation and Outreach, INTERPOL Global Complex for Innovation In an attempt to address the complex threats to multi-jurisdictional cybersecurity issues; fast changing landscape and pace of the technology; and resources required to build cyber capacity and to develop a framework for research, innovation and training, the Cybersecurity session looks to solutions to address following challenges: Cyber Research and Development Digital Forensics Capacity Development for Law Enforcement Personnel to combat cybercrime Multijurisdictional and multisectoral coordination to combat cybercrime The Evolution of Threats: New Challenges for Law Enforcement Agencies In the cyber age Alexander Gostev Chief Security Expert, Global Research & Analysis Team, Kaspersky Lab Targeted cyberattacks are a reality in today s world: every year the losses get bigger, and the number of victims grows. And the landscape of such threats is changing constantly. The actors behind the attacks are improving their tools and techniques, and widening the list of targets. In his presentation, Kaspersky Lab s Chief Security Expert, Alex Gostev will give an overview of the most serious recent cybersecurity incidents, the analysis of current trends, and the evolution of cybercriminal tools, methods and strategies. He will illustrate how these changes could impact the work of Law Enforcement Agencies Project 2020: The Future of Cybercrime Rik Ferguson Vice President of Security Research, Trend Micro Malware for humans? Internet of Things (IoT) threats? Critical Infrastructure attacks? This presentation seeks to anticipate the future of cybercrime and enable governments, businesses and citizens to prepare themselves for the challenges and opportunities of the coming decade. Project 2020 is an initiative of the International Cyber Security Protection Alliance (ICSPA) and supported by Trend Micro and Europol. It comprises a range of activities including common threat reporting, scenario exercises and policy guidance Cyber-Intelligence System Conceptual Model Mr Stephen McCombie Senior Practice Manager Advanced Cyber Defense Asia Pacific and Japan, RSA, The Security Division of EMC Coffee Break The provision of accurate and timely cyber intelligence is key to investigating and prosecuting cyber criminals. INTERPOL has broad responsibilities in terms of distributing, analysing and facilitating cyber intelligence for member agencies. This includes various intelligence feeds (from Government and Industry), specific information supplied to and from member agencies and strategic assessments for INTERPOL and member agencies. In this presentation we will outline the cyber-intelligence model to be utilised for INTERPOL, including the required strategic outcome, the service catalogue and describe the various intelligence products that will be created. We will then describe an example technology platform to facilitate the data acquisition, analysis and dissemination of that intelligence product to member agencies. The model potentially has broader application for law enforcement agencies and other organisations dealing in cyber intelligence Fighting Cybercrime Effective Collaborations by Bridging Private Sector Efficiencies and Global Law Enforcement Ecosystem Keshav Dhakad Senior Attorney & Regional Director, Digital Crimes Unit, Asia, Microsoft Cybercrime is on a rapid rise at a global scale, becoming a multi-billion dollar industry, and is causing enormous amount of disruption & financial losses. Particularly, malware facilitated crimes are having the most devastating impact on businesses,
2 governments and individuals. As a leading global IT solution provider, Microsoft takes the impact of cybercrime very seriously. Its global team of Digital Crimes Unit (DCU) through global public-private partnerships, targets cyber-criminal organizations that are making illegal profits by spreading vicious malware infections. The said public-private partnership has led to effective global disruption of botnets in the past many years and has liberating millions of infected devices at a global level, involving international/regional/local law enforcement bodies, government cybersecurity agencies, industry bodies, security firms, universities, hardware manufacturers, and ISPs. In this global collaboration, DCU s Cybercrime Center contributes by way of bringing in legal, big-data, security & technical expertise to enable those investigations and operations. The session would aim to highlight some of the key case studies of such global public-private partnership and cyber threat-intelligence sharing and collaboration A New Paradigm for Security Balaji Yelamanchili Executive Vice President and General Manager, Symantec Enterprise Security Business How do you stop a motivated attacker who has unlimited resources from compromising your enterprise s most critical data and services? Not by deploying 50 stand-alone security products and hiring a stable of expensive experts to monitor each of them. That approach doesn t scale, it has too many blind spots, and it s way too expensive. So what s the solution? Let s look into the future and see Panel Discussion moderated by Dr Madan Oberoi Director, Cyber Innovation and Outreach, INTERPOL Global Complex for Innovation Marco Obiso Cybersecurity Coordinator, ITU Ben Russell Manager, Strategy, National Cyber Crime Unit, National Crime Agency Kimmo Ulkuniemi Assistant Director, Strategy and Outreach, INTERPOL Global Complex for Innovation Dr Allan Watt Cyber Program Coordinator/Lecturer, Centre for Policing Intelligence and Counter Terrorism, Macquarie University Closing Remarks by Panel Chair, Dr Madan Oberoi Director, Cyber Innovation and Outreach, INTERPOL Global Complex for Innovation SPEAKERS BIOGRAPHY Dr Madan M. Oberoi Director, Cyber Innovation and Outreach, INTERPOL Global Complex for Innovation Dr. Madan Oberoi, an Indian Police Service officer of 1992 batch, is presently deployed as Director of Cyber Innovation and Outreach Directorate in the INTERPOL Global Complex for Innovation, Singapore. He supervises two sub-directorates including Strategy & Outreach and Research & Innovation sub-directorates. Dr. Oberoi is a Hubert Humphrey Fellow under Fulbright Scholarship Program in the area of "Cybersecurity" from University of Washington. He also holds a PhD in the area of cybercrime from IIT, Delhi. Dr. Oberoi has worked as Inspector General of Police with Central Bureau of Investigation, India, where he headed their Cybercrime Cell, Technical and Forensic Zone and International Police Cooperation Unit. Dr. Oberoi has also served in two UN Peace Keeping Missions.
3 Alexander Gostev Chief Security Expert, Global Research & Analysis Team, Kaspersky Lab Alex founded and led the Global Research & Analysis Team from 2008 before moving to his current position as Chief Security Expert with the team in Alex analyzes all aspects of information security, with a focus on new threats and mobile malware. His responsibilities include detecting and analyzing new malware. His research and analytical articles are published both on dedicated IT sites and in the mass media. He has been with the company since 2002 and is based in Moscow. Prior to joining Kaspersky Lab, Alex worked as CTO for KomiSat and before that as Manager of the ISP department at Komitex and as a Systems Administrator for SMZ. In 1996, Alex founded the Republic of Komi Antivirus Center and in 1998, he acted as Project Coordinator for the Wildlist Russia Project, an initiative which was launched with the aim of collecting and analyzing information about malware outbreaks in the Russian Federation. Rik Ferguson Vice President of Security Research, Trend Micro Rik Ferguson is one of the leading experts in information security. He is also an advisor to the EU Safer Internet Forum, The Information Security Alliance EURIM, a project leader with Europol and the International Cyber Security Prevention Alliance (ICSPA), a director of Get Safe Online, Vice Chair of the Centre for Strategic Cyberspace & Security Science and advisor to various UK government technology forums. In April 2011 Rik was inducted into the Infosecurity Hall of Fame. Rik writes the Countermeasures blog and is the lead spokesperson for Trend Micro. He also writes regular columns for CIO, ZDNet, T3 and several other European publications. In this position, Rik is actively engaged in research into online threats and the underground economy. He also researches the wider implications of new developments in the Information Technology arena and their impact on security both for consumers and in the enterprise. Stephen McCombie Senior Practice Manager Advanced Cyber Defense Asia Pacific and Japan, RSA, The Security Division of EMC Stephen McCombie is a Senior Manager for the Advanced Cyber Defense (ACD) Practice responsible for Asia Pacific & Japan. In this capacity Stephen is responsible for overall professional services engagement for incident response/discovery (IR/D), breach readiness, remediation, SOC/CIRC design and proactive computer network defense. Stephen possesses more than 30 years of industry, academic and law enforcement experience including specialised skills in digital forensics, incident response and strategic threat assessments. Prior to RSA, Stephen was the global leader for CSC s Security Incident Response Control Center (SIRCC) and as the Global Consulting Practice leader for Incident Response. Stephen holds a Ph.D. in computer science from Macquarie University, a Masters of IT from Deakin University and a Bachelor of Arts in International Relations from Macquarie University. Stephen holds numerous industry security certifications, including Certified Information Systems Security Professional (CISSP), Information Systems Security Management Professional (ISSMP) and Certified Fraud Examiner (CFE). Keshav Dhakad Senior Attorney & Regional Director, Digital Crimes Unit, Asia, Microsoft Keshav Dhakad is a Senior Attorney & Regional Director of Microsoft Digital Crimes Unit (DCU), Asia Region, as part of Legal & Corporate Affairs, based out of Singapore. Keshav supervises the initiatives and strategies in the Asia region related to malicious software crimes, cyber-threat intelligence collaboration, trusted cloud, cybercrime & cybersecurity awareness & outreach, intellectual property law, and license compliance. Keshav is also the regional chairperson of the Business Software Alliance (BSA) Asia committee, and he is a licensed attorney for the State of New York, USA. Keshav joined Microsoft in 2007, as the head of Microsoft India s IP Crimes & License Compliance department. Keshav enjoys writing and speaking on cybercrime, cybersecurity, and intellectual property subject areas.
4 Balaji Yelamanchili Executive Vice President and General Manager, Enterprise Security Business, Symantec Balaji Yelamanchili currently serves as Executive Vice President and General Manager of Symantec s Enterprise Security Business. In this capacity, Balaji has overall P&L responsibility for the company s enterprise security products and services business. Prior to joining Symantec, he served as Senior Vice President of Business Intelligence and Enterprise Performance Management Products at Oracle. In this role, Balaji was responsible for Oracle s business analytics and performance management product strategy, management, product development, and product Go-to-Market (GTM) functions. Before that, he was Senior Vice President and General Manager of the Content Management and Archiving Division at EMC Corporation and was a Vice President at Products for Documentum Inc. He also worked at Rational Software Corporation (now part of IBM) and Electronic Data Systems (now part of HP), in a variety of development, marketing, and market development areas. Balaji holds a Master of Science degree in Engineering from Louisiana State University at Baton Rouge, Louisiana, and a Master of Business Administration from the University of Michigan at Ann Arbor Michigan. Marco Obiso Cybersecurity Coordinator, ITU Marco Obiso is Cybersecurity Coordinator at the International Telecommunication Union (ITU), the lead UN-specialized agency for ICTs and has been working in the field of Information and Communication Technologies for the past two decades. He has been operating in several ICT related domains such network infrastructure development, system integration, application cooperation, IT Service Management, Internet governance and information security. He is currently facilitating the work of ITU in elaborating Cybersecurity strategies and implementing programmes and initiatives for the benefit of ITU Member States, including providing technical assistance in establishing capabilities as well as working to strengthen coordination and cooperation within the UN system. Ben Russell Manager, Strategy, National Cyber Crime Unit, National Crime Agency Ben Russell is a Manager in the Strategy and Partnerships team of the UK National Crime Agency s Cyber Crime Unit (NCCU). The NCCU leads the UK s law enforcement response to serious organised cyber crime, leading operations, supporting partners and coordinating the UK's entire law enforcement cyber response. Ben is responsible for ensuring the NCCU has the right people, skills and capabilities to operate effectively. This includes leading on recruitment of staff, managing the Department's innovation and change programme and working with partners across the NCA and Government to transform the Agency's capability to operate effectively in the internet age. Ben's previous roles include leading the NCCU's relationships with UK Government and international law enforcement partners and as Staff Officer to the NCCU Head. He has also worked for the UK's Serious Organised Crime Agency and Child Exploitation Online Protection Centre (CEOP) and, prior to joining law enforcement, was Managing Director of a youth leadership charity. Kimmo Ulkuniemi Assistant Director, Strategy and Outreach, INTERPOL Global Complex for Innovation Mr Kimmo Ulkuniemi, INTERPOL Global Complex for Innovation Assistant Director for Strategy and Outreach has worked in the Finnish Police since Prior to his appointment to INTERPOL he was Deputy Head of the Europol National Unit in Finland and was responsible for Europol coordination in Finnish law enforcement. Mr Ulkuniemi has more than 10 years' experience in international police cooperation in INTERPOL, Europol and Schengen and he has experience on the investigation and international cooperation on cybercrimes. He has also worked in the Council of European Union and the United Nations.
5 Dr Allan Watt Cyber Program Coordinator/Lecturer, Centre for Policing Intelligence and Counter Terrorism, Macquarie University Dr. Allan Watt is the Cyber Program Coordinator at Centre for Policing Intelligence and Counter Terrorism (PICT), Macquarie University. Previously he served in the New Zealand Army and the New Zealand Police, for a combined period of 18 years. Most of his Police service was as an Intelligence Analyst. In 1999 he formed his own computer forensics business and in 2008 moved to Sydney Australia, where he was the Head of e.forensics, for a Litigation Support firm and in June 2011, he took a position with the NSW Police Force, State Electronic Evidence Branch. In May 2013, he commenced as a fulltime lecturer with PICT. He has completed over 1000 Digital Forensic Examinations and is a recognised expert witness in many jurisdictions.
The National Cyber Security Strategy Our Forward Plans December 2013 1 The UK Cyber Security Strategy Report on progress December 2013 Our Forward Plans Two years have passed since we first set out our
Inter-American Development Bank Institutional Capacity of the State Division (ICS), Institutions for Development (IFD) From Cybersecurity to Cybercrime: A Framework for Analysis and Implementation TECHNICAL
Qatar National Cyber Security Strategy MAY 2014 i ii TABLE OF CONTENTS FOREWORD... v EXECUTIVE SUMMARY... vi 1. INTRODUCTION...1 2. THE IMPORTANCE OF CYBER SECURITY TO QATAR...3 2.1 Threats... 3 2.2 Challenges...
Cyber Security: Designing and Maintaining Resilience White paper presented by: Georgia Tech Research Institute Cyber Technology and Information Security Laboratory Dr. George A. Wright Chief Engineer Terrye
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
The IT Industry s Cybersecurity Principles for Industry and Government 2011 ITI MEMBER COMPANIES Apple Inc. TABLE OF CONTENTS Executive Summary 5 Setting the Stage 7 Six Cybersecurity Principles 9 Principle
110101001101101101010011000 11011010100110110101001100 11011010011011010100110000 10100110110101001100010010 Protecting Information The Role of Community Colleges in Cybersecurity Education A Report from
Protecting Our Future Protecting Our Future Educating a Cybersecurity Workforce edited by Jane LeClair Copyright 2013 by Hudson Whitman/ Excelsior College Press All rights reserved. No part of this book
A Rhode Island Academic Collaboration on Cybersecurity Technology and Policy (CCTP) Abstract The University of Rhode Island, Brown University, and the U.S. Naval War College, with the engagement of Bryant
Section 2 Trends Concerning Cyberspace 1 Cyberspace and Security Owing to the information technology (IT) revolution in recent years, information and communication networks such as the Internet are becoming
ICC CYBER SECURITY GUIDE FOR BUSINESS ICC CYBER SECURITY GUIDE FOR BUSINESS Acknowledgements The ICC Cyber security guide for business was inspired by the Belgian Cyber security guide, an initiative of
in depth report Managing digital risk Trends, issues and implications for business about lloyd s Lloyd s is the world s leading specialist insurance market, conducting business in over 200 countries and
WHITE PAPER Cybersecurity in Modern Critical Infrastructure Environments SECURE-ICS Be in Control Securing Industrial Automation & Control Systems This document is part of CGI s SECURE-ICS family of cyber
Testimony of Farnam Jahanian, Ph.D. Assistant Director Computer and Information Science and Engineering Directorate Before the Committee on Science, Space, and Technology Subcommittee on Technology and
ICS-CERT Year in Review Industrial Control Systems Cyber Emergency Response Team 2013 National Cybersecurity and Communications Integration Center What s Inside Welcome 1 National Preparedness 2 Prevention
Script The May 2015 THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST UK Cyber Security: The role of insurance ALSO INSIDE Update from Ian Glover Record numbers at Congress 2015 A review of CRESTCon Congress
TELSTRA CYBER SECURITY REPORT 2014 Security insights, trends and impact to Australian organisations EXECUTIVE SUMMARY The internet presents a world of social connectivity, economic growth and endless opportunities
The CFO Forum Conference Program as of April 8, 2015; Program subject to change KEYNOTE ADDRESS How International Economies Impact Us David Hale, Global Economist and Advisor to Fortune 500 Companies STRATEGY
National Cyber Security Research Agenda Trust and Security for our Digital Life Version 1.2 dr.ir. Herbert Bos prof.dr. Sandro Etalle dr.ir. Erik Poll Editors: (Vrije Universiteit Amsterdam) (Technische
I3P Workshop Report Workforce Development: Understanding the Demand Sponsored by The Institute for Information Infrastructure Protection (I3P) Co-chaired by Seymour E. Goodman, Shari Lawrence Pfleeger,
Report on Cybersecurity and Critical Infrastructure in the Americas Contents Message from OAS Assistant Secretary General... 1 Foreword... 3 Organization of American States... 3 Trend Micro... 4 Executive
Proceedings of the First IFIP TC9 / TC11 Southern African Cyber Security Awareness Workshop 2011 Gaborone, Botswana 12 May 2011 A workshop managed by CSIR, South Africa Edited by J Phahlamohlaka, L Leenen,
THE GRADUATE SCHOOL CAreer Forward Advance with a respected graduate degree from UMUC. www.umuc.edu/moveforward An advanced degree opens the door to CAreer advancement Professional credentials can help
CYBERSECURITY POLICY MAKING AT A TURNING POINT Analysing a new generation of national cybersecurity strategies for the Internet economy Also includes contributions from non-governmental stakeholders Cybersecurity
National Spatial Data Infrastructure Strategic Plan 2014 2016 Federal Geographic Data Committee December 2013 Federal Geographic Data Committee Federal Geographic Data Committee, Reston, Virginia: 2013
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to