JOIN THE 2015 CYBERSECURITY CAMPAIGN
|
|
- Mervin Harvey
- 8 years ago
- Views:
Transcription
1 JOIN THE 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow
2 Cybersecurity has emerged as a top priority for the U.S. Chamber. In an interconnected world, economic security and national security are linked. Attacks in cyberspace are being carried out by nation-states, hacktivists, and criminal organizations. Bad actors can compromise public safety, classified information, intellectual property, sensitive personal data, and business networks, putting America s security at risk. This year, cybercrime topped the intelligence community s global threat assessment, and former FBI Director Robert Mueller declared that cyberattacks will eventually pose as great a threat to our national security as al-qaeda and could even surpass it. The Chamber has been leading on cybersecurity for years. In 2014, it launched a new comprehensive campaign under the banner Improving Today. Protecting Tomorrow to advance cybersecurity policies and legislation while educating businesses of all sizes about cyber threats and how to protect against them. For a second year in a row, the Chamber is continuing the cybersecurity campaign with four regional roundtables planned in advance of its Fourth Annual Cybersecurity Summit on October 6. The Chamber s work would not be possible without your support. Please review the information in this brochure to learn about the campaign and sponsorship opportunities. For more information, please contact me (abeauchsene@uschamber.com, ); Matthew Eggers (meggers@uschamber.com, ); or Vincent Voci (vvoci@uschamber.com, ). Sincerely, Ann Beauchesne Senior Vice President National Security and Emergency Preparedness Department U.S. Chamber of Commerce 2
3 U.S. Chamber s National Security & Emergency Preparedness Department Established in 2003 to develop and implement the Chamber s homeland and national security policies. The department works through the National Security Task Force, a policy committee composed of roughly 200 Chamber members representing a broad spectrum of the nation s economy. The task force s Cybersecurity Working Group identifies current and emerging issues, crafts policies and positions, and provides analysis and direct advocacy to government and business leaders. The need to address increasingly sophisticated threats against American and global businesses has gone from an IT issue to a top priority for the C-suite and the boardroom. In an interconnected world, economic security and national security are linked. To maintain a strong and resilient economy, we must protect against the threat of cyberattacks. - Chamber President and CEO Thomas J. Donohue Many cybersecurity experts say that there are two types of businesses those that have been hacked and know it, and those that have been hacked and don t know it yet. As large businesses strengthen their cyber protections, small and medium-size ones are increasingly the victims of malicious actors. However, many hurdles stand in the way of meaningful change: Congressional gridlock. Appropriate roles of government entities in private-public partnerships. Lack of information sharing regarding threats between government and industry. Cyberattacks against U.S. businesses owing to a lack of credible deterrence. Misalignment of international cyber regimes. Demand for cybersecurity personnel outstripping supply. 3
4 Background: Cybersecurity framework is an important riskmanagement tool The White House released on February 12, 2014, the first version of the Framework for Improving Critical Infrastructure Cybersecurity (the framework). It was capably developed over the past 12 months by the U.S. Department of Commerce s National Institute of Standards and Technology (NIST) in close collaboration with the U.S. Chamber s National Security Task Force/Cybersecurity Working Group and other private sector organizations. NIST officials led a public-private effort coordinating an environment where standards and security specialists identify existing cybersecurity best practices and guidance throughout industry sectors and promote their implementation. The Chamber has valued NIST s involvement with the framework. NIST has treated the business community as a genuine partner and tackled a tough assignment in ways that should serve as a model for other agencies and departments. What the framework does The framework is largely a process it s designed to help organizations start a cybersecurity program or improve an existing one. The framework features a number of industry-vetted actions that businesses can take to assess and strengthen their state of security over time. It is not meant to be regulatory, which would be troublesome to industry. Additionally, the framework provides organizations including their customers, partners, and suppliers with common language for the following: Understanding their current cybersecurity posture. Setting goals for cybersecurity improvements. Monitoring progress toward their goals. Fostering communications with their internal and external stakeholders. There s a rough consensus among cybersecurity experts that a high percentage of unsophisticated or untargeted malicious activity can be stopped by implementing elements of the framework. Using the framework is tantamount to improving one s cyber fitness. There are built-in assumptions that an organization s cyber capabilities will degrade if it becomes passive, and that continual improvement is necessary for a business to keep pace with threats. 4
5 The framework is a good start, but more work ahead No single strategy can prevent advanced and persistent threats, known as APTs in cybersecurity jargon, from breaching an organization s cyber defenses. APTs typically refer to cyberattacks originating from foreign powers or their surrogates. The framework is a good start, but more work is needed. Most small and midsize businesses, after all, don t have the money or human talent required to take on highly sophisticated and nefarious actors, such as organized criminal gangs and groups carrying out state-sponsored attacks. The following are some key activities: Increasing awareness and use of the framework and growing market solutions: The Chamber is planning more cyber roundtables. In 2014, the Chamber organized four roundtable events with state and local chambers across the country prior to the Chamber s Third Annual Cybersecurity Summit on October 28. Leading member sponsors of the cybersecurity campaign were American Express, Dell, and Splunk. Additional roundtable and summit sponsors were the American Gas Association, Boeing, Edison Electric Institute, Exelon, HID Global, Microsoft, Oracle, Pepco Holdings, Inc., and The Wall Street Journal. The Chamber will continue involving NIST, the Department of Homeland Security (DHS), and law enforcement to help early users of the framework and to grow market solutions for curbing cyber threats. Passing information-sharing legislation: Passing information-sharing legislation is the Chamber s No. 1 cyber legislative priority. The framework will be incomplete without the enactment of information-sharing legislation that removes legal and regulatory penalties to quickly exchange data about evolving threats to industry. Engaging law enforcement: The Chamber is in close contact with the FBI and the Secret Service, which are often the first entities to learn of criminals access to company networks. The Chamber engages law enforcement to build trusted public-private relationships, which are essential to confirming a crime and beginning a criminal investigation. FBI and Secret Service officials participated in each of the Chamber s 2014 roundtables. Monitoring independent agencies: The independent agencies ranging from the Federal Communications Commission (FCC) to the Securities and Exchange Commission (SEC) can use the framework to regulate the business community. For example, some policymakers are pushing the SEC to compel businesses to report incidents with increasing specificity, which many in industry find troubling. 5
6 Modernizing cybersecurity regulations: Information-security requirements should not be cumulative. The Chamber believes it is valuable that agencies and departments are urged under the 2013 cybersecurity presidential order to report to the Office of Management and Budget (OMB) any critical infrastructure subject to ineffective, conflicting, or excessively burdensome cybersecurity requirements. Aligning international cybersecurity regimes: Many Chamber members operate globally. We anticipate working with NIST and the Chamber s International Division (Center for Global Regulatory Cooperation) to urge foreign governments to embrace the framework. Efforts to improve the cybersecurity of the public and private sectors should reflect the borderless and interconnected nature of our digital environment. Raising adversaries costs through deterrence: The Chamber is reviewing actions that can be taken by businesses to deter nefarious actors that threaten to empty bank accounts, steal trade secrets, or damage vital infrastructures. The United States needs to thoughtfully shift the costs associated with advanced cyberattacks in ways that are timely, legal, and proportionate relative to the threats. 6
7 2014 Cybersecurity Campaign Summary The Chamber s new cybersecurity campaign Improving Today. Protecting Tomorrow had a very good first year attracting nearly 1,000 government and industry attendees at six events: four regional roundtables, a cyber panel at Americas Small Business Summit, and the Chambers Third Annual Cybersecurity Summit. These events generated significant media coverage. Core strengths of the campaign include promoting members desire to be branded with a positive cyber effort, as well as advancing their commercial cybersecurity solutions to industry and government. The campaign complements the Chamber s efforts to affect meaningful change in policy. In just a few years, the Chamber has become an influential voice on cyber policy and politics. The campaigns 2015 message urges businesses of all sizes to have a cybersecurity risk management plan and update it regularly. Regional Roundtable Events: The Chamber hosted four half-day regional roundtable events in Austin, Chicago, Everett, and Phoenix. Roundtables featured more than 45 government and industry speakers, cybersecurity principals from the White House, DHS, NIST, and local FBI and Secret Service officials. The Chamber and its partners urged businesses to adopt fundamental Internet security practices to reduce network and system weaknesses and make the price of successful hacking increasingly steep. Third Annual Cybersecurity Summit: Washington, D.C. 27 speakers including 9 government speakers One-day event featuring two keynote sessions by White House Cybersecurity Coordinator Michael Daniel and Admiral Michael Rogers, Commander, U.S. Cyber Command and three panel discussions including a Q&A session with Sens. Diane Feinstein (D-CA) and Saxby Chambliss (R-GA). 7
8 Media Coverage: Thirty print publications and television affiliates covered the Chamber s 2014 Cybersecurity Campaign. The 2014 Cybersecurity Summit generated the most media coverage in its history. In a keynote speech at the U.S. Chamber of Commerce s third annual Cybersecurity Summit, White House Cybersecurity Coordinator Michael Daniel discussed the myriad of technological, economic, political and psychological challenges that have made cybersecurity such a hard problem. He pointed to a number of initiatives that the White House has launched in recent years to help address security risks posed to data held by both public- and private-sector entities, including the National Strategy for Trusted Identities in Cyberspace. Allison Grande. White House Wants To 'Kill' Online Passwords, Adviser Says. Law360. October 28, At an Austin cybersecurity conference Thursday, experts cited the Target example as they encouraged Austin businesses large and small to use newly issued guidelines to protect themselves and their customers. Laylan Copelin. Experts: Businesses can't ignore cyber threats. Austin American Statesman. July 10, At Tuesday's event, [Admiral Mike] Rogers said Defense Department officials are continuing to work to update military rules of engagement in cyberspace. Too many foreign nations and individuals apparently think that attacking U.S. networks is a low-risk proposition, Rogers said. That is not in our best interests in the long term as a nation for others to have that perception, Rogers said. We need to change that. Brendan Sasso. NSA Chief Warns Companies Against Revenge Hackings. National Journal. October 28, Almost all Fortune 500 companies have been hacked at some point, Mr. [John] Carlin told the U.S. Chamber of Commerce s annual Cybersecurity Summit. Have you thought ahead to the day when you will have to face your customers, your employees, your board, and your shareholders? he said. If that day was today, could you tell them that you ve done everything in your power to protect your company s future? Phillip Swarts. In cybersecurity battle, government-business cooperation necessary: Justice Official. The Washington Times. October 28,
9 2014 CYBERSECURITY CAMPAIGN SPONSORS SILVER GOLD SILVER 9
10 Sponsorship Options The Chamber s National Security & Emergency Preparedness Department must raise funds to carry out the cybersecurity campaign. Four roundtables, an international event, and the summit are being planned. The Chamber offers organizations several sponsorship opportunities. Value Proposition 10
11 I. Platinum ($100K) Incentive: At this level, only one company may represent a single sector (e.g., communications, energy, financial services, or IT). Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of four regional events in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 11
12 II. Enterprise Partnership Two Large Companies Sponsor Jointly ($150K) Incentive: By jointly sponsoring the campaign, each company pays $75K instead of $100K. Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Four complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of two regional events in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Four complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 12
13 III. Gold ($75K) This is an ideal level for a large company that wants to raise its cybersecurity profile. Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Four complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of two regional events in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Four complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 13
14 IV. Silver ($50K) The Silver-level was popular in This level is perfect for a midsize business that wants to brand itself with a positive effort or market its cybersecurity solutions. Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Two complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of one regional event in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Two complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 14
15 V. Cyber Mentorship One Large Company Plus One Small or Midsize Business ($40K) Incentive: Mentor a business in your supply chain and save $10K. Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Two complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of one regional event in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Two complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 15
16 VI. Association Sponsorship ($20K) Incentive: Association pays $20K total for the four roundtables and the summit. What s not to like! Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of four regional events in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent 16
17 VII. Association Partnership Two Associations Sponsor Jointly ($30K) Incentive: Each association pays $15K total for the four roundtables and the summit, instead of $20K. Sponsorship of the U.S. Chamber s Fourth Annual Cybersecurity Summit, October 6, 2015 Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list postevent Sponsorship of four regional events in conjunction with local chambers of commerce Logo on promotional materials, website, press releases, invitations, and blog VIP reserved seating Six complimentary invitations for company representatives Display table at event Opportunity to present content during an introduction or to serve on a panel Logo and corporate description in program One time use of attendee list post event *** U.S. Chamber Contacts Ann Beauchesne (abeauchesne@uschamber.com), Senior Vice President Matthew Eggers (meggers@uschamber.com), Senior Director Vincent Voci (vvoci@uschamber.com), Policy Manager Call
2015 CYBERSECURITY CAMPAIGN. Improving Today. Protecting Tomorrow. Page 1
2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow Page 1 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow JOIN THE CYBERSECURITY EDUCATION AND FRAMEWORK AWARENESS CAMPAIGN
More information2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow
2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer
More informationPresidential Summit Reveals Cybersecurity Concerns, Trends
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Presidential Summit Reveals Cybersecurity Concerns,
More informationCorporate Perspectives On Cybersecurity: A Survey Of Execs
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Corporate Perspectives On Cybersecurity: A Survey
More informationCYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
More informationCybersecurity and Corporate America: Finding Opportunities in the New Executive Order
Executive Order: In the President s State of the Union Address on February 12, 2013, he announced an Executive Order Improving Critical Infrastructure Cybersecurity (EO) to strengthen US cyber defenses
More informationThe Dow Chemical Company. statement for the record. David E. Kepler. before
The Dow Chemical Company statement for the record of David E. Kepler Chief Sustainability Officer, Chief Information Officer, Business Services and Executive Vice President before The Senate Committee
More informationCyber Security and the White House
West Texas Cyber Security Consortium GOVERNMENT IT REPORT White House Tilts Toward Public-Private Cybersecurity Cooperation By John K. Higgins E-Commerce Times Part of the ECT News Network 06/23/14 5:00
More informationWritten Testimony of. Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the
Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Subcommittee on Research and Technology Committee on Science, Space, and Technology U.S.
More information2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP
2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf
More informationwww.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationCYBERSECURITY RISK MANAGEMENT
CYBERSECURITY RISK MANAGEMENT Evan Wolff Maida Lerner Peter Miller Kate Growley 233 Roadmap Cybersecurity Risk Overview Cybersecurity Trends Selected Cybersecurity Topics Critical Infrastructure DFARS
More informationTHE WHITE HOUSE Office of the Press Secretary
FOR IMMEDIATE RELEASE February 13, 2015 THE WHITE HOUSE Office of the Press Secretary FACT SHEET: White House Summit on Cybersecurity and Consumer Protection As a nation, the United States has become highly
More informationCyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
More informationGAO CRITICAL INFRASTRUCTURE PROTECTION. Significant Challenges in Developing Analysis, Warning, and Response Capabilities.
GAO United States General Accounting Office Testimony Before the Subcommittee on Technology, Terrorism and Government Information, Committee on the Judiciary, U.S. Senate For Release on Delivery Expected
More informationS. ll IN THE SENATE OF THE UNITED STATES
OLL0 TH CONGRESS ST SESSION S. ll To secure the United States against cyber attack, to improve communication and collaboration between the private sector and the Federal Government, to enhance American
More informationThe Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
More informationFFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
More informationTestimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationTestimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy
Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy House Committee on Homeland Security Subcommittee on Cybersecurity, Infrastructure
More informationDean C. Garfield President & CEO, Information Technology Industry Council (ITI) Committee on Energy and Commerce
Written Testimony of Dean C. Garfield President & CEO, Information Technology Industry Council (ITI) Before the Committee on Energy and Commerce Subcommittee on Communications and Technology U.S. House
More informationRemarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the New England Council Boston, Massachusetts May 16, 2014 It s a pleasure to be with you back home in Boston. I was here just six weeks ago
More informationCYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
More informationWhite Paper on Financial Industry Regulatory Climate
White Paper on Financial Industry Regulatory Climate According to a 2014 report on threats to the financial services sector, 45% of financial services organizations polled had suffered economic crime during
More informationConfrontation or Collaboration?
Confrontation or Collaboration? Congress and the Intelligence Community Cyber Security and the Intelligence Community Eric Rosenbach and Aki J. Peritz Cyber Security and the Intelligence Community The
More informationStatement of Edward Amoroso, Ph.D. Senior Vice President & Chief Security Officer AT&T. United States House of Representatives
Statement of Edward Amoroso, Ph.D. Senior Vice President & Chief Security Officer AT&T Hearing: DHS s Cybersecurity Mission: Promoting Innovation and Securing Critical Infrastructure United States House
More informationCybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
More informationwww.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
More informationMARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.
MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message
More informationSeptember 24, 2015. Mr. Hogan and Ms. Newton:
Mr. Michael Hogan and Ms. Elaine Newton Office of the Director, Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Drive Mail Stop 8930 Gaithersburg, MD 20899-8930
More informationManaging cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
More informationDeveloping a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION. Cristin Flynn Goodwin J.
Developing a National Strategy for Cybersecurity FOUNDATIONS FOR SECURITY, GROWTH, AND INNOVATION Cristin Flynn Goodwin J. Paul Nicholas October 2013 Contents Executive Summary... 3 What Is a National
More informationHow To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
More informationIntegrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and Healthy Students Hamed Negron-Perez,
More informationNATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY
NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY JANUARY 2012 Table of Contents Executive Summary 1 Introduction 2 Our Strategic Goals 2 Our Strategic Approach 3 The Path Forward 5 Conclusion 6 Executive
More informationNine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity
Nine recommendations for alternative funds battling cyber crime kpmg.ca/cybersecurity Cyber criminals steal user names and passwords and use it to conduct financial trading activity illicitly. Hackers
More informationCLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS
CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS NEW YORK Jeremy Feigelson jfeigelson@debevoise.com WASHINGTON, D.C. Satish M. Kini smkini@debevoise.com Renee
More informationAn Overview of Large US Military Cybersecurity Organizations
An Overview of Large US Military Cybersecurity Organizations Colonel Bruce D. Caulkins, Ph.D. Chief, Cyber Strategy, Plans, Policy, and Exercises Division United States Pacific Command 2 Agenda United
More informationCybersecurity: Legislation, Hearings, and Executive Branch Documents
CRS Reports & Analysis Print Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist (rtehan@crs.loc.gov, 7-6739) View Key CRS Policy Staff May
More informationThe Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.
The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco. 1 Calling All CEOs Are You Ready to Defend the Battlefield of the 21st Century? It is not the norm for corporations to be
More informationPACB One-Day Cybersecurity Workshop
PACB One-Day Cybersecurity Workshop WHAT IS CYBERSECURITY? PRESENTED BY: JON WALDMAN, SBS CISA, CRISC 1 Contact Information Jon Waldman Partner, Senior IS Consultant CISA, CRISC Masters of Info Assurance
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies
More informationAnswering your cybersecurity questions The need for continued action
www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:
More informationCyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks July 2014 Cyber Threat Intelligence and Incident Coordination Center: Protecting
More information(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392)
(HTTP://WWW.ADDTHIS.COM/BOOKMARK.PHP?V=250&PUBID=XA- 4EC5891570C11392) VISIT: WWW.TTCUS.COM (HTTP://WWW.TTCUS.COM /? HSTC=40060925.4FE4E58F02ECBE9D993453E16A8EB373.1374161815407.1374161815407.1374161815407.1&
More informationThe FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
More informationSurviving the Ever Changing Threat Landscape
Surviving the Ever Changing Threat Landscape Kevin Jordan Cyber Security Specialist Dell GLBA FFIEC NCUA PCI HIPAA NERC CIP FISMA 700+ Percentage of U.S. adults who Federal named online and banking state
More informationActions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
More informationTestimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology
Testimony of Dan Nutkis CEO of HITRUST Alliance Before the Oversight and Government Reform Committee, Subcommittee on Information Technology Hearing entitled: Cybersecurity: The Evolving Nature of Cyber
More informationCorporate Spying An Overview
Corporate Spying An Overview With the boom in informational and technological advancements in recent years, there comes the good and the bad the bad being more susceptibility to the theft of confidential
More informationThe European Response to the rising Cyber Threat
SPEECH/12/315 Cecilia Malmström European Commissioner responsible for Home Affairs The European Response to the rising Cyber Threat Transatlantic Cyber Conference organised by the Center for Strategic
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool
ICBA Summary of FFIEC Cybersecurity Assessment Tool July 2015 Contact: Jeremy Dalpiaz Assistant Vice President Cyber Security and Data Security Policy Jeremy.Dalpiaz@icba.org www.icba.org ICBA Summary
More informationImplementation of the Cybersecurity Executive Order
Implementation of the Cybersecurity Executive Order November 13 th, 2013 Ben Beeson, Partner, Lockton Companies Gerald J. Ferguson, Partner, BakerHostetler Mark Weatherford, Principal, The Chertoff Group
More informationCyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World
Cyber-Crime, Cyber-Espionage, Cyber-War, & Cyber-Threats: An Exploration of Illegal Conduct & Warfare in the Cyber-World Moderator: Panelists: Honorable Preet Bharara, United States Attorney, Southern
More informationConnecting the dots: A proactive approach to cybersecurity oversight in the boardroom. kpmg.bm
Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom kpmg.bm Connecting the dots: A proactive approach to cybersecurity oversight in the boardroom 1 Connecting the dots:
More informationSTATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE;
STATEMENT OF MR. THOMAS ATKIN ACTING ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY OFFICE OF THE SECRETARY OF DEFENSE; LIEUTENANT GENERAL JAMES K. MCLAUGHLIN DEPUTY COMMANDER,
More informationIntegrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)
Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs) Amy Banks, U.S. Department of Education, Center for School Preparedness, Office of Safe and
More informationRemarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity
More informationCyber Incident Annex. Cooperating Agencies: Coordinating Agencies:
Cyber Incident Annex Coordinating Agencies: Department of Defense Department of Homeland Security/Information Analysis and Infrastructure Protection/National Cyber Security Division Department of Justice
More informationTHE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual
More informationState Governments at Risk: The Data Breach Reality
State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO
More informationWILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES
WILLIS SPECIAL REPORT: 10K DISCLOSURES HOW RETAIL COMPANIES DESCRIBE THEIR CYBER LIABILITY EXPOSURES This special report examines the cyber risk disclosures made by the retail sector of the Fortune 1000.
More informationTHE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Detection, analysis, and understanding of threat
More informationINFOCUS. Five Questions to Guide Cybersecurity Risk Management BY EARL CRANE
promontory.com INFOCUS JUNE 3, 2015 BY EARL CRANE Five Questions to Guide Cybersecurity Risk Management The quick transformation of cybersecurity risk management from obscure specialty to top-of-thehouse
More informationNo. 33 February 19, 2013. The President
Vol. 78 Tuesday, No. 33 February 19, 2013 Part III The President Executive Order 13636 Improving Critical Infrastructure Cybersecurity VerDate Mar2010 17:57 Feb 15, 2013 Jkt 229001 PO 00000 Frm 00001
More information10Minutes. on the stark realities of cybersecurity. The Cyber Savvy CEO. A changed business environment demands a new approach:
10Minutes on the stark realities of cybersecurity The Cyber Savvy CEO Highlights Business leaders must recognise the exposure and business impact that comes from operating within an interconnected global
More information2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
More informationHow To Protect Your Business From A Cyber Attack
Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It
More informationRE: Comments on Vietnam s Draft Law on Information Security, version 2.22
July 10, 2013 Ministry of Information and Communications 18 Nguyen Du Hanoi, Vietnam RE: Comments on Vietnam s Draft Law on Information Security, version 2.22 Dear Sir/Madam: The Information Technology
More informationPREPUBLICATION COPY. More Intelligent, More Effective Cybersecurity Protection
More Intelligent, More Effective Cybersecurity Protection January 2013 Business Roundtable (BRT) is an association of chief executive officers of leading U.S. companies with more than $7.3 trillion in
More informationAre your people playing an effective role in your cyber resilience?
Are your people playing an effective role in your cyber resilience? 01 Cyber attacks are now business as usual for organizations around the world. Organizations have typically trusted in technology to
More informationwww.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
More informationPROMOTION // TECHNOLOGY. The Economics Of Cyber Security
PROMOTION // TECHNOLOGY The Economics Of Cyber Security Written by Peter Mills Malicious cyber activity, from hacking and identity fraud to intellectual property theft, is a growing problem within the
More informationunderstanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;
GermanoLawLLC provides client- focused counsel and assistance regarding cybersecurity and data privacy concerns. We help companies understand, prepare for and address internal and external cybersecurity
More informationC DIG COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CSCSS / DEFENCE INTELLIGENCE GROUP
C DIG CSCSS / DEFENCE INTELLIGENCE GROUP COMMITTED TO EXCELLENCE IN CYBER DEFENCE. ONE MISSION. ONE GROUP. CENTRE FOR STRATEGIC CSCSS CYBERSPACE + SECURITY SCIENCE C DIG CSCSS / DEFENCE INTELLIGENCE GROUP
More informationStatement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the
Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology
More informationCyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
More informationcyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!
cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You! Cybersecurity is all over the news. Target, University of Maryland, Neiman
More informationWritten Statement of Richard Dewey Executive Vice President New York Independent System Operator
Written Statement of Richard Dewey Executive Vice President New York Independent System Operator Senate Standing Committee on Veterans, Homeland Security and Military Affairs Senator Thomas D. Croci, Chairman
More informationGaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
More informationRemarks by. Thomas J. Curry Comptroller of the Currency. Before a Meeting of CES Government. Washington, DC April 16, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before a Meeting of CES Government Washington, DC April 16, 2014 Good afternoon. It s a pleasure to finally be here with you. I had very much hoped
More informationWhy you should adopt the NIST Cybersecurity Framework
www.pwc.com/cybersecurity Why you should adopt the NIST Cybersecurity Framework May 2014 The National Institute of Standards and Technology Cybersecurity Framework may be voluntary, but it offers potential
More informationTestimony of. Doug Johnson. New York Bankers Association. New York State Senate Joint Public Hearing:
Testimony of Doug Johnson On behalf of the New York Bankers Association before the New York State Senate Joint Public Hearing: Cybersecurity: Defending New York from Cyber Attacks November 18, 2013 Testimony
More informationExamining the Evolving Cyber Insurance Marketplace
Prepared Testimony and Statement for the Record of Ola Sage Founder and CEO e-management Hearing on Examining the Evolving Cyber Insurance Marketplace Before the Senate Committee on Commerce, Science,
More informationDelving Into FCC's 'Damn Important' Cybersecurity Report
Portfolio Media. Inc. 860 Broadway, 6th Floor New York, NY 10003 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com Delving Into FCC's 'Damn Important' Cybersecurity
More information20+ At risk and unready in an interconnected world
At risk and unready in an interconnected world Key findings from The Global State of Information Security Survey 2015 Cyber attacks against power and utilities organizations have transitioned from theoretical
More informationCYBER SECURITY GUIDANCE
CYBER SECURITY GUIDANCE With the pervasiveness of information technology (IT) and cyber networks systems in nearly every aspect of society, effectively securing the Nation s critical infrastructure requires
More informationAND RESPONSE. Continuity Insights Conference Chicago June 18-19, 2013. Unclassified
CYBER THREATS AND RESPONSE Continuity Insights Conference Chicago June 18-19, 2013 Unclassified OBJECTIVES Why it is important Threats, players, and response FBI s Next Generation Cyber Government and
More informationState Engagement with the Energy Sector to Improve Cyber Security
Contact: Allison Cullin Homeland Security and Technology Division 202/624-5311 April 20, 2010 State Engagement with the Energy Sector to Improve Cyber Security Executive Summary The state-owned computer
More informationBefore the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 ) ) ) ) )
Before the DEPARTMENT OF COMMERCE National Telecommunications and Information Administration Washington, DC 20230 In the Matter of Stakeholder Engagement on Cybersecurity in the Digital Ecosystem Docket
More informationU. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
More informationCybersecurity: Legislation, Hearings, and Executive Branch Documents
Cybersecurity: Legislation, Hearings, and Executive Branch Documents Rita Tehan, Information Research Specialist (rtehan@crs.loc.gov, 7-6739) April 17, (R43317) Summary Cybersecurity vulnerabilities challenge
More informationCyber-Security. FAS Annual Conference September 12, 2014
Cyber-Security FAS Annual Conference September 12, 2014 Maysar Al-Samadi Vice President, Professional Standards IIROC Cyber-Security IIROC Rule 17.16 BCP The regulatory landscape Canadian Government policy
More informationCyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation
More informationS. 21 IN THE SENATE OF THE UNITED STATES
II 11TH CONGRESS 1ST SESSION S. 1 To secure the United States against cyber attack, to enhance American competitiveness and create jobs in the information technology industry, and to protect the identities
More informationDefending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
More informationGAO. INFORMATION SECURITY Persistent Weaknesses Highlight Need for Further Improvement
GAO For Release on Delivery Expected at time 1:00 p.m. EDT Thursday, April 19, 2007 United States Government Accountability Office Testimony Before the Subcommittee on Emerging Threats, Cybersecurity,
More information