Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda

Size: px
Start display at page:

Download "Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda"

Transcription

1 Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda The East Africa Economic & Hi-Tech Crime Forum, Uganda, 2011 (the Forum), is an interactive conference focused on providing practical training as well as the opportunity to build and develop working relationships with vendors, clients, regulators, partners and investors. The Forum has positioned itself to launch an aggressive campaign to develop trust and accountability throughout the East African Region, going straight to the heart of what will drive further economic development and business opportunity. Interest in the East Africa Economic & Hi-Tech Crime Forum 2011 has grown from strength to strength as private organisations, professional associations and government institutions within the East African region and beyond become sensitized to the benefits of investing their resources and man power to minimise the impact of economic crime in general and the growing threat of that crime being committed through the misuse of technology. Whilst this may not change perspectives overnight this Forum aims to provide premium access to the latest information, resources and training focused on tackling Economic & Hi-Tech Crime in East Africa. Hosted by: The Benefits of Attending Include 1. Sensitization to Economic & Hi-Tech Crime prevention methods within East Africa and Beyond 2. Advice on how you and your organisation can gain by protecting itself against Economic & Hi-Tech Crime 3. Foresight to anticipate Economic & Hi-Tech Crime issues before they arise 4. Exclusive Insights on how the fight against Economic Crime can push forward development 5. Understanding of the recent EAC Legislation & how it will affect your organisation 6. Practical training on the best tried & tested practices of globally recognised experts 7. Premium support in the fight against Economic & Hi-Tech Crime 8. Focus on Cost-Effective methods that protect against Economic & Hi-Tech Crime Streamlined Interactive s empowering you to meet both your organisation s & your own professional development needs 10. Access to the latest technology resources designed to Prepare, Prevent and Protect your organisation against Economic & Hi-Tech Crimes Supported by:

2 FINAL AGENDA: For assistance in the selection of delegates to attend, the delivery of the topics will bring together three main professional stakeholder groups: 1. Legal, including operational risk and compliance 2. Technical, including IT and data technology risk 3. Accounting, including Internal Audit and Risk 08:00am - 09:00am 09:00am 09:30am 09:30am 10:30am 10:30am 11:00am 11:00am - 12:30am Interactive s 12:30pm 13:30pm 13:30pm 15:00 pm Interactive s 15:00pm 15:30pm 15:30pm 17:00pm Registration & Welcome Coffee Opening Address and Instruction Dr. Rugunda Minister ICT and Major General Kale Kayihura Economic and hi-tech crime in East Africa Covering: - Local trends - Uganda Case study Mustapha Mugisha Fraud Risk Management Led by John Webb Lunch Break Fighting the Emergence of Cyber Crime in East Africa: Strategies, Frameworks & Lessons from Other Africa Countries Led by Albert Antwi- Boasiako UCC presentation Led by Patrick Mwesigwa 08:30am 09:30am Day 2 Welcome Coffee & Days Announcements 09:30am 10:30am Business Case for Compliance Led By Gavin Irwin (Room 1) ACFE Investigation Model Led by Mustapha Mugisha (Room 2) 10:30am 11:00am 11:00am - 12:30am Interactive s 12:30pm 13:30pm 13:30pm 15:00 pm Interactive s 15:00pm 15:30pm 15:30pm 17:00pm Interactive s Forensic Accounting Led by John Webb Lunch Break Business Case for e-discovery Led by Albert Antwi - Boasiako Question Time Panel: IGP, DPP, ISACA, KTPN Speaker: Albert Antwi Boasiako African Center for Cyberlaw and Cybercrime Prevention

3 08:30am 09:30am Day 3 Welcome Coffee & Days Announcements 09:30am 10:30am 10:30am 11:00am 11:00am - 12:30am Interactive s 12:30pm 13:30pm No Tech Hacking Led by Johnny Long Insider Fraud Prevention Led by Daniels Ochieng Lunch Break 13:30pm 15:00 pm Interactive s 15:00pm 15:30pm Interim Remedies Led by Philip Aliker (Room 1) The use of computer forensics within banking Led by Collins Ojiambo (Room 2) 15:30pm 17:00pm Panel Session Strategies For National Cyber Security Efforts African Centre for Cyber Law and Cyber Crime Prevention Hosted by: Supported by:

4 EAST AFRICA ECONOMIC AND HI-TECH CRIME FORUM UGANDA 2011 Fighting the Emergence of Cyber Crime in East Africa: Strategies, Frameworks & Lessons from Other Africa Countries PRESENTATION OUTLINE: 1. Introduction ---Overview of the cyber crime problem Global & Africa Perspective ---Specific case scenarios and examples to illustrate the magnitude of the problem to the developing world e.g. most overseas merchants do no accept credit card purchases from countries like Nigeria and Ghana because of cyber risks ---Cyber governance & nodes on security in the cyber space 2. Multi-Dimensional Framework of Fighting Cyber Crime from the East Africa Perspective 1. Legal Dimensions ----institutional & legal dynamics towards high tech crimes ----enacting new cyber legislations and conventions ----harmonizing existing criminal laws to response to cyber threats 2. Educational Dimensions ---national awareness and capacity building in the fight against the threat ---knowledge sharing through multilateral organizations/institutions ---the role of the universities & learning centres ---developing cyber crime knowledge base 2. Technological Dimensions ---exploring technology to response to technology-driven problem ---exploring cost-effective technologies ---opportunities to consider open source technology solutions ---developing partnership with global cyber crime solution providers 3. Case Study: The Public Sphere and Policing of Cyber Crime in East Africa ---Instituting the neo-peelian Paradigm of Policing in Cyber Crime Policing in East Africa ---Training the police to improve law enforcement response ---Equipping the police ---Regulating & Enforcing the behaviour of online/internet users 4. An African Response to Cyber Threats Lessons from Other African Countries # The Mauritius Example ---Overview of the legal and institutional framework in Mauritius ---Establishment of Police High Tech Crime Unit in the country Mauritius National Information Security Strategy Plan since Establishment of Computer Emergency Response Team in Mauritius (CERT-mu) How the Mauritius Example has improved enforcement and the fight of high tech crimes (argument to be supported by data to be collected from the Mauritius authorities) 5. Conclusions ---Critical challenges in developing effective response to cyber threats in East Africa ---Forum discussion as to how to address these challenges with participants given the opportunity to provide their opinion/experiences/their views ---Questions & Answer session [1 hour 30 mins

5 EAST AFRICA ECONOMIC AND HI-TECH CRIME FORUM UGANDA 2011 Business Case for e-discovery in Corporate East Africa PRESENTATION OUTLINE: 1. Introduction ---A Brief Questionnaire on e-discover to be completed by participants before the start of the presentation. Rationale: participants self-assessment of their perception of e-discovery as an emerging area of GRC. The questionnaire will be reviewed at the end of the lecture together with the assessment of lecture outcomes. ---A preview of e-discovery as an integral component of Governance, Risk Management & Compliance (GRC) ---A preview of the emergence of e-discovery solutions and models across the global corporate landscape and relevance of e-discovery to the emerging Corporate East Africa. 2. The Economics of e-discovery in the Corporate Sector East Africa in Perspective (Why Businesses across East Africa should invest in e-discovery solutions) ---e-discovery & Corporate Litigations Readiness Practical Case: Avoidance/reduction in fines due to breaching Legal requirements ---e-discovery & Corporate Due Diligence Processes Practical Case: facilitates investigations prior to business partnerships, contracts, advantages in tender processes, etc ---Corporate Obligations: Compliance & Regulations Practical Case: Compliance with existing legislations, compliance with SLAs ---e-discovery as a Proactive Risk Management Solution Practical Case: in business continuity and disaster recovery process ---Quality Corporate Information Governance Quality of corporate information/data, process for automated data search, effective storage & archive management, transparency in data/information flow, effective information/data auditing system ---Corporate cost prevention/reduction Cost/Benefit Analysis of e-discovery, reduction in cost of data migration during system change, reduction in time spent on information search, facilitates & fastens business processes including request processes 3. e-discovery Models & Technologies ---Proactive vs. Reactive e-discovery Models ---Proactive e-discovery Model for the corporate sector with reference to the Electronic Discovery Reference Model (EDRM) ---highlighting the importance of implementing proactive e-discovery solutions ---e-discovery best practices in the corporate sector ---e-discovery Technology Solutions 4. Conclusion, Questions & Reviews ---review the questionnaire completed by participants and assessing lecture outcomes ---questions and answer sessions ---conclusions with highlights on cost effective strategies and mechanism to adopt e-discovery solutions. [1 hour 30 mins]

6 THE TEAM BEHIND THE FORUM: Focus on East Africa is a multimedia trade & investment communication firm whose primary objective is to build positive economic perceptions of East Africa globally. With its headquarters in London and offices in Kampala, and growing, the firm aims to effectively present the East African business perspective and leverage business partnerships in a globalising market-place. The firm works across the publishing, internet, research, public affairs, market visits and forums platforms to deliver fully integrated communications solutions for its clients. KTPN Limited is a business information, training and management private limited company. KTPN stands for the Knowledge to Power Network that is focused on empowering people. Namely, graduates (or equivalent) who through their knowledge and experiences can utilise their ideas to build sustainable businesses and develop their careers not only to benefit themselves, but also for the communities around them. The Managing Director has experience of running large corporate security conferences in London, UK that attracted delegates from around the world. Forum Contact Details: Mr. Joel Ankunda Matsiko LL.B (Hons) Managing Director KTPN Limited t: +44 (0) m: +44 (0) Uganda Number: M: (0) e: [email protected] w: Registered In England No: Hosted by: Supported by:

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum 2013 26 April 2013 Yaoundé, Cameroon Cécile Barayre Programme Manager, E-Commerce and Law Reform,

More information

INFORMATION SECURITY TESTING

INFORMATION SECURITY TESTING INFORMATION SECURITY TESTING SERVICE DESCRIPTION Penetration testing identifies potential weaknesses in a technical infrastructure and provides a level of assurance in the security of that infrastructure.

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

London Business Interruption Association Technology new risks and opportunities for the Insurance industry London Business Interruption Association Technology new risks and opportunities for the Insurance industry Kiran Nagaraj Senior Manager, KPMG LLP February 2014 Agenda Introduction The world we live in

More information

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE 2009 ITU Regional Cybersecurity Forum for Africa and Arab States Tunis, 4-5 June 2009 Patrick Mwesigwa, Director/Technology & Licensing,

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015

Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED. 25-27 March 2015 Expert Meeting on CYBERLAWS AND REGULATIONS FOR ENHANCING E-COMMERCE: INCLUDING CASE STUDIES AND LESSONS LEARNED 25-27 March 2015 Cyberlaws and Regulations for enhancing e-commerce including Case Studies

More information

Day 3-24 April 2013. Day 2-23 April 2013

Day 3-24 April 2013. Day 2-23 April 2013 Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim

More information

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations

More information

Honourable members of the National Parliaments of the EU member states and candidate countries,

Honourable members of the National Parliaments of the EU member states and candidate countries, Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National

More information

Professional Certificate in Ethics and Anti-Corruption Compliance

Professional Certificate in Ethics and Anti-Corruption Compliance in partnership with Professional Certificate in Ethics and Anti-Corruption Compliance Maxwell Chambers, Singapore, November 18th & 19th 2015 Enhance & develop your understanding of Ethics & Compliance

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

Digital Forensics Services

Digital Forensics Services Digital Forensics Services A KPMG SERVICE FOR G-CLOUD VII October 2015 kpmg.co.uk Digital Forensics Services KPMG PROVIDES RELIABLE END TO END COMPUTER FORENSIC AND EXPERT WITNESS SERVICES We bring together

More information

THE REPUBLIC OF UGANDA DPP

THE REPUBLIC OF UGANDA DPP THE REPUBLIC OF UGANDA DPP Staff Training and Development Policy 2014 TABLE OF CONTENTS 1.0 INTRODUCTION 3 1.1 Policy and Legal Framework 4 1.2 Principles/Guidelines of the Training and Staff Development

More information

Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.

Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents. Sponsorship Opportunities 5-2016 Thomas Odams Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 [email protected] About The RANT Forum (Risk and Network Threat Forum) The RANT Forum

More information

Cyber Risk & Insurance

Cyber Risk & Insurance Cyber Risk & Insurance The Risk Managers Forum Thursday 27 November 2014 One-day conference Grange City Hotel, 8-14 Cooper s Row, London EC3N 2QB Event sponsor Headline sponsor Cyber Risk & Insurance The

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Cyber security Country Experience: Establishment of Information Security Projects.

Cyber security Country Experience: Establishment of Information Security Projects. Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority

More information

Pacific Islands Telecommunications Association

Pacific Islands Telecommunications Association Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: [email protected] www.pita.org.fj INVITATION

More information

CEOP Relationship Management Strategy

CEOP Relationship Management Strategy Making every child child matter matter... everywhere... everywhere CEOP Relationship Management Strategy Breaking down the barriers to understanding child sexual exploitation Child Exploitation and Online

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

ESKISP6056.01 Direct security testing

ESKISP6056.01 Direct security testing Direct security testing Overview This standard covers the competencies concerning with directing security testing activities. It includes setting the strategy and policies for security testing, and being

More information

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation. Keynote Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation 6 & 7 Nov 2013 So many of us now don t just work online but live part

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

Short courses presented by the NWU Programme in Forensic Accountancy

Short courses presented by the NWU Programme in Forensic Accountancy Short courses presented by the NWU Programme in Forensic Accountancy Certificate in: Commercial Forensic Accounting Commercial Forensic Law Commercial Forensic Investigation Commercial Forensic Information

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

ETI PERSPECTIVE 2020: A FIVE YEAR STRATEGY

ETI PERSPECTIVE 2020: A FIVE YEAR STRATEGY ETI PERSPECTIVE 2020: A FIVE YEAR STRATEGY Introduction This document is the final and Board approved version of ETI s strategic directions based on the ETI Board meeting discussion of 12 th March 2015.

More information

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Internet Safety and Security: Strategies for Building an Internet Safety Wall Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts

CYBER SECURITY. ADVISORY SERVICES Governance Risk & Compliance. Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts CYBER SECURITY ADVISORY SERVICES Governance Risk & Compliance Shemrick Rodney IT Specialist Consultant Antigua & St. Kitts The Financial Services Industry at Crossroads: Where to From Here? WELCOME What

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Cloud Services for Microsoft

Cloud Services for Microsoft The success of your business depends on your ability to adapt to a dynamic market environment, where globalisation and economic pressures are reshaping the landscape. To remain competitive, your organisation

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

WAPIS PROGRAMME. West African Police Information System. This Programme is funded by the European Union

WAPIS PROGRAMME. West African Police Information System. This Programme is funded by the European Union WAPIS PROGRAMME West African Police Information System This Programme is funded by the European Union WAPIS PROGRAMME Contents 1. Origin 4 2. What is WAPIS? 5 2.1 Overall objectives 6 2.2 Main stakeholders

More information

DECLARATION OF THE 7 th WORLD SCIENCE FORUM ON The Enabling Power of Science. 7 th World Science Forum, Budapest, 7 th November 2015 PREAMBLE

DECLARATION OF THE 7 th WORLD SCIENCE FORUM ON The Enabling Power of Science. 7 th World Science Forum, Budapest, 7 th November 2015 PREAMBLE DECLARATION OF THE 7 th WORLD SCIENCE FORUM ON The Enabling Power of Science 7 th World Science Forum, Budapest, 7 th November 2015 PREAMBLE With the encouragement and support of the founding organisations

More information

Playing Our Part in Responding to National Threats

Playing Our Part in Responding to National Threats Agenda Item 7 Report of: The Secretary of the Police and Crime Panel Date: 1 February 2016 1. Purpose of Report Playing Our Part in Responding to National Threats 1.1 This report provides Members with

More information

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100

SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE. Question No. 100 SENATE STANDING COMMITTEE ON LEGAL AND CONSTITUTIONAL AFFAIRS AUSTRALIAN FEDERAL POLICE Question No. 100 Senator McKenzie asked the following question at the hearing on 24 May 2012: a) How do you define

More information

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY

CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY CYBER SECURITY DASHBOARD: MONITOR, ANALYSE AND TAKE CONTROL OF CYBER SECURITY INTRODUCTION Information security has evolved. As the landscape of threats increases and cyber security 1 management becomes

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

PCL2\13991300\1 CYBER RISKS: RISK MANAGEMENT STRATEGIES

PCL2\13991300\1 CYBER RISKS: RISK MANAGEMENT STRATEGIES PCL2\13991300\1 CYBER RISKS: RISK MANAGEMENT STRATEGIES Cyber Attacks: How prepared are you? With barely a day passing without a reported breach of corporate information security, the threat to financial

More information

BSc (HONS) MANAGEMENT

BSc (HONS) MANAGEMENT BSc (HONS) MANAGEMENT WITH COMPLIANCE Original Thinking Applied 01 BSc (Hons) Management with Compliance A new part-time degree for compliance and anti-money laundering professionals is now available from

More information

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime. Agenda Item No. 5 COMMUNITY OUTCOMES MEETING SUBJECT: CYBER CRIME 4 August 2015 Report of the Chief Constable PURPOSE OF THE REPORT 1. This report outlines the Force s current position in relation to the

More information

APCC London Regional Forum. Monday, 16 th June 2014

APCC London Regional Forum. Monday, 16 th June 2014 APCC London Regional Forum Monday, 16 th June 2014 Agenda 13.00 13.30 Registration, tea and coffee 13.30 13.40 Welcome and introduction - Kevin Parkinson, Director of the APCC 13.40 14.20 View for the

More information

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,

More information

REGISTER AT IIF.COM/TRAINING

REGISTER AT IIF.COM/TRAINING IIF EXECUTIVE PROGRAM ON PRIVATE BANKING AND WEALTH MANAGEMENT Evolving Wealth Transformation in Dynamic Growth Markets November 16-17, 2015 Singapore IN COOPERATION WITH COURSE DESCRIPTION IIF EXECUTIVE

More information

IPSOS MORI S 2016 FUTURE OF RESEARCH SERIES

IPSOS MORI S 2016 FUTURE OF RESEARCH SERIES WELCOME TO IPSOS MORI S 2016 FUTURE OF RESEARCH SERIES Welcome to Ipsos MORI s 2016 Future of Research Series. These events highlight some of the latest topics and trends in the industry and are open to

More information

Services for professional procurement. Be better informed, make better decisions. Trading House Qualification System (THQS) www.achilles.

Services for professional procurement. Be better informed, make better decisions. Trading House Qualification System (THQS) www.achilles. Services for professional procurement. Be better informed, make better decisions. Trading House Qualification System (THQS) www.achilles.com Improving supply chain management Increasing globalisation has

More information

Department for Business, Innovation and Skills 1 Victoria Street London SW1H 0ET. 7 th May 2014. Dear Sir or Madam,

Department for Business, Innovation and Skills 1 Victoria Street London SW1H 0ET. 7 th May 2014. Dear Sir or Madam, Department for Business, Innovation and Skills 1 Victoria Street London SW1H 0ET 7 th May 2014 Dear Sir or Madam, The Federation of Small Businesses (FSB) welcomes the opportunity to respond to this consultation

More information

Targeting the problem together

Targeting the problem together 18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

(FOR THE HANDLING AND PROCESSING OF MOBILE PHONES AND OTHER MOBILE DEVICES SO AS TO ENSURE THAT THOSE DEVICES IDENTIFIED AS STOLEN ARE HANDLED IN

(FOR THE HANDLING AND PROCESSING OF MOBILE PHONES AND OTHER MOBILE DEVICES SO AS TO ENSURE THAT THOSE DEVICES IDENTIFIED AS STOLEN ARE HANDLED IN (FOR THE HANDLING AND PROCESSING OF MOBILE PHONES AND OTHER MOBILE DEVICES SO AS TO ENSURE THAT THOSE DEVICES IDENTIFIED AS STOLEN ARE HANDLED IN ACCORDANCE WITH THE AGREED GUIDELINES) CONTENTS 1. PREFACE

More information

ESKISP6054.01 Conduct security testing, under supervision

ESKISP6054.01 Conduct security testing, under supervision Overview This standard covers the competencies required to conduct security testing under supervision. In order to contribute to the determination of the level of resilience of an information system to

More information

Helen Grant MP Minister for Sport and Tourism Department for Culture, Media and Sport 100 Parliament Street LONDON SW1A 2BQ 29 January 2014

Helen Grant MP Minister for Sport and Tourism Department for Culture, Media and Sport 100 Parliament Street LONDON SW1A 2BQ 29 January 2014 Helen Grant MP Minister for Sport and Tourism Department for Culture, Media and Sport 100 Parliament Street LONDON SW1A 2BQ 29 January 2014 Dear Minister Following the meeting on 10 December 2013 with

More information

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit

Building up Specialized Cybercrime Units and Responsibilities for Managers. Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit Building up Specialized Cybercrime Units and Responsibilities for Managers Virgil SPIRIDON ROMANIAN NATIONAL POLICE Head of National Cybercrime Unit SCOPE for fighting cybercrime Freedom of communication

More information

Digital Marketplace - G-Cloud

Digital Marketplace - G-Cloud Digital Marketplace - G-Cloud CRM Services Core offer 9 services in this area: 1. Dynamics CRM Upgrade Services Utilising this service, Core will undertake an evaluation of your current CRM platform. We

More information

THE WORLD IS MOVING FAST, SECURITY FASTER.

THE WORLD IS MOVING FAST, SECURITY FASTER. THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS

More information

LETTER TO BROKERS. Today we are launching Reputation Risk Solutions Limited:

LETTER TO BROKERS. Today we are launching Reputation Risk Solutions Limited: LETTER TO BROKERS Today we are launching Reputation Risk Solutions Limited: We are a new and unique independent specialist Reputation Risk Insurance Intermediary. We believe Reputation Risk Insurance is

More information

Cybersecurity Governance

Cybersecurity Governance AfriSIG 2014 Cybersecurity Governance Pria.za.africa Encoding Cybersecurity Norms and Principles Issues, Developments and Approaches Cybersecurity Governance Political Will and Leadership Institutional

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

Ethical Trading Initiative Management Benchmarks

Ethical Trading Initiative Management Benchmarks Ethical Trading Initiative Management Benchmarks The Management Benchmarks are the means by which ETI (a) sets out its expectations of members and (b) measures members progress in applying the ETI Base

More information

Raising Finance in the Bond Market

Raising Finance in the Bond Market Raising Finance in the Bond Market 18 19 September 2014, London A debt primary markets workshop Academy Who we are The educational model of the Academy is that of a "Corporate University" where the traditional

More information

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for?

Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Hit ratios are still very low for Security & Privacy coverage: What are companies waiting for? Authored by Neeraj Sahni and Tim Stapleton Neeraj Sahni is Director, Insurance Channel at Kroll Cyber Investigations

More information

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise

Udyen Jain & Associates Quality and expertise that you deserve. OCA, Organisation Conseil Audit Your vision, our expertise Udyen Jain & Associates Quality and expertise that you deserve OCA, Organisation Conseil Audit Your vision, our expertise Mikaël Ouaniche Mikaël Ouaniche is a Chartered Accountant and Legal Auditor, Graduate

More information

Email Retention. A Workshop on Email Retention Policies:- The risks, possible approaches and implementation issues

Email Retention. A Workshop on Email Retention Policies:- The risks, possible approaches and implementation issues Introduction Most inter- and intra-business communication takes place by email. The bases for critical decisions and contractual agreements are often only documented in email. Courts both in Europe and

More information

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization

Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Security & IT Governance: Strategies to Building a Sustainable Model for Your Organization Outside View of Increased Regulatory Requirements Regulatory compliance is often seen as sand in the gears requirements

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

Below are the module descriptions for all modules currently taught on our BA (Hons) Accounting and Finance course.

Below are the module descriptions for all modules currently taught on our BA (Hons) Accounting and Finance course. BA (Hons) Accounting and Finance module descriptions Below are the module descriptions for all modules currently taught on our BA (Hons) Accounting and Finance course. Year One Core Modules Economics for

More information

Guiding Principles on Cyber Security. Guidance for Internet Service Providers and Government

Guiding Principles on Cyber Security. Guidance for Internet Service Providers and Government Guiding Principles on Cyber Security Guidance for Internet Service Providers and Government December 2013 Contents Contents... 2 Industry Contributors... 3 Introduction... 4 Section 1 - Internet Service

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

ICT Barriers, High Tech Crime, and Police

ICT Barriers, High Tech Crime, and Police ICT Barriers, High Tech Crime, and Police Mitchell F. Rice, Ph.D. Fellow, National Academy of Public Administration (Washington, DC) Professor of Political Science Mail Stop 4348 Texas A&M University College

More information

Reducing Cost and Risk Through Software Asset Management

Reducing Cost and Risk Through Software Asset Management RESEARCH SUMMARY NOVEMBER 2013 Reducing Cost and Risk Through Software Asset Management A survey conducted by CA Technologies among delegate attendees at the 2013 Gartner IT Financial, Procurement & Asset

More information

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE

Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE Jason Jordaan: MTech, BTech, CFE, PMCSSA, ACE 9 Cranbrook Road, Sunnyridge, East London, 5201 Cellphone Number: 083 556 7112 E-Mail: [email protected] Professional Summary A multidisciplinary digital

More information

Digital preservation a European perspective

Digital preservation a European perspective Digital preservation a European perspective Pat Manson Head of Unit European Commission DG Information Society and Media Cultural Heritage and Technology Enhanced Learning Outline The digital preservation

More information

5 th Infosec Week & Cyber Bootcamp. 12 th to 16 th October ISEG Lisbon School of Economics & Management

5 th Infosec Week & Cyber Bootcamp. 12 th to 16 th October ISEG Lisbon School of Economics & Management 5 th Infosec Week & 5th Edition of Infosec Week & In order to innovate the annual activities of Cybersecurity month, ShadowSEC innovate this issue doing a Cyber Bootcamp, with the main objective of sharing

More information

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012 ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe CENTR General Assembly, Brussels October 4, 2012 [email protected] 1 Who we are ENISA was

More information

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime

Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime COU CIL OF THE EUROPEA U IO EN Council Conclusions on a Concerted Work Strategy and Practical Measures Against Cybercrime 2987th JUSTICE and HOME AFFAIRS Council meeting Brussels, 27-28 ovember 2008 The

More information

The Recover Report. It s business. But it s personal.

The Recover Report. It s business. But it s personal. The Recover Report It s business. But it s personal. Executive summary The Recover Report The perpetrators This report examines a sample of 150 data theft cases handled by Mishcon de Reya. Our research

More information