SECURING PAYMENTS IN THE CYBER WORLD
|
|
|
- Monica Edwards
- 10 years ago
- Views:
Transcription
1 The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT
2
3 WELCOME In the last few years, the usages of electronic payments have increased significantly through various channels. Digital technology touches virtually every aspect of our daily lives. Governments and regulatory authorities are promoting electronic payments through various initiatives and supporting laws. As the adoption of technology allows for the proliferation and growth of electronic payments, new risks are being realized and threats continue to grow in volume and sophistication. To address these risks, the Central Bank of Kuwait (CBK) in collaboration with The Institute of Banking Studies (IBS) and in coordination with Gulf Cooperation Council- Secretariat General (GCCSG) is pleased to organize an Information Security Forum on Securing Payments in the Cyber World for the security specialists in the Banking and Financial sector in Kuwait and the GCC Central Banks. This full day event will host security professionals, subject matter experts and analysts from International and Local organizations who will discuss and focus on the following domains of information security: Securing Payments in the Cyber World: Online, Mobile & Cross Border Cyber Laws & Regulations Research and Trends in Online and ecrime, Cybersecurity and Fraud Prevention We look forward to welcoming you at this forum. Central Bank of Kuwait
4 OBJECTIVE The objective of this forum is to discuss emerging threats and risks to cybersecurity as well as highlight the importance of Information Security within the Banking and Financial services sector. The forum will be an opportunity to raise awareness on Cybersecurity risks and present the latest research, best practices and recommendations to mitigate these risks. Various Information Security topics will be discussed, with particular attention to securing payment systems. International and Local subject matter experts will be invited to share their experiences and knowledge. In addition to presenting the latest developments and trends in cybersecurity, the forum will also provide a venue for discussion among information security professionals and experts, as well as foster opportunities for cooperation and networking between peers. AIMS OF THE FORUM Gain independent understanding of Payment Systems (Online, Mobile and Cross border) Get insight into Innovation and Security in Retail Payments Understand Legal, Regulatory and Oversight arrangements for Securing Payments in the Cyber World Explore Bitcoin, Electronic Currency, and Non-Traditional Payment Vehicles Realize latest Research and Trends in Online and ecrime, Cyber Security and Fraud Prevention Understand techniques on preventing mobile fraud Discover best practices for securing payments in cyberspace Understand the need to be Cyber Resilient Meet and network with industry experts and peers
5 TARGET AUDIENCE CIOs and CTOs Chief Information Security Officers IT Security Professionals Risk Management Professionals Government Regulators Financial Sector Auditors Internal Control Managers IT Governance professionals Information Technology Managers Chief Security Architects IT and Network Security Executives and Managers Governance, Risk, Compliance and Privacy Executives ROUNDTABLE SESSIONS In addition to the speaker sessions, four roundtable sessions will be organized towards the end of the forum that will provide preregistered attendees with an opportunity to have in-depth discussions and allow for more interaction with the speakers. The roundtable discussions will cover the following topics: Making Internet and Mobile Payments More Secure Payments Innovations Connecting Fraud Prevention and IT Security Defense in Depth: Aligning Cyber Security with Laws & Regulations
6 Agenda 08:00 08:30 08:45 09:10 09:15 09:40 09:45 10:05 10:10 10:25 10:25 10:40 10:45 11:00 11:05 11:20 11:25 11:40 11:40 12:10 12:15 12:40 12:45 13:05 13:10 13:30 13:35 13:50 13:55 14:00 14:00 15:15 15:15 16:00 Registration Forum Opening and Keynote Address Mrs. Hanaa Razzouqi - Executive Director IT & Banking Operations Sector Central Bank of Kuwait Innovation and Security in Retail Payments: The European Experience Ms. Stephanie Czák - Senior Market Infrastructure Expert European Central Bank Legal, Regulatory and Oversight Arrangements for Securing Payments in the Cyber World Mr. Harish Natarajan - Senior Payment Systems Specialist World Bank Payment Systems Development Group Panel Discussion Participants: European Central Bank, World Bank, and Central Bank of Kuwait Coffee Break Securing Payments in GCC Net Mr. Abdulla Al-Ajmi - General Manager The Shared Electronic Banking Services Company KNET Key Elements To Improve Cyber Security Mr. Khalid N. Sadiq Al-Hashmi - Executive Director Cyber Security/QCERT - Ministry of Information and Communication Technology - Qatar Moving from Cyber Security to Cyber Resilience Mr. Majed Al Adwani Unit Head IT Security Central Bank of Kuwait Noon & Prayer Break Bitcoin, Electronic Currency, and Non-Traditional Payment Vehicles Professor Benjamin G. Edelman Harvard University European Cyber Security Strategy and Related Directives: a Legislative and Regulatory Approach Mr. Rolf von Rössing - Member of Professional Influence and Advocacy Committee ISACA Tackling Mobile Fraud: The Next Frontier Mr. Andras Cser - VP and Principal Analyst Forrester Research Panel Discussion Participants: Professor Edelman, ISACA, and Forrester Research Forum Closing Note Central Bank of Kuwait Lunch Roundtable Sessions Run in Parallel - Pre-event Registration is Required Making Internet and Mobile Payments More Secure Ms. Stephanie Czák ECB Connecting Fraud Prevention and IT Security Mr. Andras Cser Forrester Payments Innovations Professor Benjamin G. Edelman Harvard University Defence in Depth: Aligning Cyber Security with Laws & Regulations Mr. Rolf von Rössing ISACA
7 Registration Form *asterisk indicated required field Name: * First Middle Family Job Title: * Institute Name: * Address: * Mobile No.: * Office No.: * Country: * ROUNDTABLE SESSIONS RUN IN PARALLEL - PRE-EVENT REGISTRATION IS NEEDED Scheduled at 3:15 PM 4:00 PM 1 st Making Internet and Mobile Payments More Secure Ms. Stephanie Czák ECB 2 nd Connecting Fraud Prevention and IT Security Mr. Andras Cser Forrester 3 rd Payments Innovation Professor Benjamin G. Edelman Harvard University 4 th Defence in Depth: Aligning Cyber Security with Laws & Regulations Mr. Rolf von Rössing ISACA Please check the roundtable session number you wish to attend, as seats are limited in each session to a maximum of 15 participants who will be registered on a first come first served basis 1 st 2 nd 3 rd 4 th Please send the completed registration form to [email protected] or fax number Note: Arabic Simultaneous Interpretation Service Will Be Provided VENUE INFORMATION Date: Sunday 16th November 2014 Time: 08:00 to 16:00 Jumeirah Messilah Beach Hotel Tel: [email protected] REGISTRATION INFORMATION Registration is by invitation only, which includes participation in the full day forum, lunch, refreshments and any Forum materials produced during and after the event. Forum Website:
8 SPEAKERS Mrs. Hana A. Al Razzouqi Executive Director for the Information Technology and Banking Operations Sector Central Bank of Kuwait Hana A. Al Razzouqi is responsible for the overall Information Technology environment at CBK, as well as Banking Operations that include KD issuance, budgeting, account services for banks and government entities as offered through the activities of the Banking Operations Department, Information Systems & Operations Department, IT Strategic Planning Department & IT Security Unit. Prof. Benjamin G. Edelman Professor Harvard University Benjamin G. Edelman is an associate professor at the Harvard Business School in the Negotiation, Organizations & Markets unit. His research explores the public and private forces shaping Internet architecture and business opportunities, with particular focus on online advertising, competition, regulation, and consumer protection. Professor Edelman s consulting practice focuses on preventing and detecting online fraud. Representative clients include the ACLU, AOL, the City of Los Angeles, the National Association of Broadcasters, Microsoft, the National Football League, the New York Times, Universal Music Group, the Washington Post, and Wells Fargo.
9 Mr. Rolf Von Rössing Member of ISACA s Professional Influence and Advocacy Committee Mr. Rolf is a CISA, CISM, CGEIT, and a member of ISACA s Professional Influence and Advocacy Committee and is past international vice-president of ISACA. He is also president of Forfa AG, a Swiss consulting network, and a retired partner at KPMG Germany. Rolf has served as a consultant with large international banks and insurance companies and was responsible for international projects in business continuity management and information security. Rolf has published extensively on business continuity management, disaster recovery, crisis management and security matters. Most recently, he authored Transforming Cybersecurity Using COBIT 5, published by ISACA. Mr. Andras Cser VP and Principal Analyst Forrester Research Andras serves Security and Risk Professionals. He is a leading expert on fraud management, cloud security identity management, access management, user account provisioning, entitlement management, federation, privileged identity management, and role design and management. Andras helps clients develop enterprise strategies for creating business value through cloud security and enterprise fraud management, which has many synergies with identity and access management when an organization needs to protect against risk and wants to manage fraud appropriately.
10 Ms Stephanie Czák Senior Market Infrastructure Expert European Central Bank Stephanie Czák joined the European Central bank s Oversight Division in As senior expert, she is responsible for the development and implementation of European oversight standards for payment systems and payment instruments. She coordinates the work of the European Forum of Retail Payments (SecuRe Pay), a cooperation of EU/EEA supervisors and overseers on issues related to the security of retail payments. In particular, she contributed to the SecuRe Pay recommendations on the security of internet payments, mobile payments and third party access to payment accounts. Mr. Harish Natarajan Senior Payment Systems Specialist World Bank Payment Systems Development Group Harish is a Senior Payment Systems Specialist with the Payment Systems Development Group, at the World Bank. His responsibilities include assisting countries in improving safety, reliability and efficiency of payments, remittances and securities settlement systems; participating in country and regional payment systems diagnostic studies; and supporting countries in implementation of payment systems and payment systems reforms. He is currently working on projects in these areas in several countries across all World Bank regions. He also represents the World Bank in the retail payments working group of the CPSS-BIS. He has participated in the Financial Sector Assessment Program (FSAP) in Papua New Guinea, Oman, India, Malaysia, Vietnam, Kazakhstan and Suriname.
11 Mr. Khalid N. Sadiq Al-Hashmi Executive Director Cyber Security QCERT Khalid is a CISSP, CISM, ITIL and has more than 18 years of experience in the Information Technology field, with particular expertise in cyber security, information infrastructure and ICT systems planning. His role as Executive Director for Cyber Security-QCERT, Qatar s National Program, is to safeguard the country s information and communications systems and to address cyber security risks in order to protect sensitive information in addition to the development of a national strategy for cyber security. Khalid played an imperative role in establishing the GCC CERT Committee and was appointed chairman for the first year; the committee addresses cyber security threats in the Gulf region. Mr. Abdulla Al-Ajmi General Manager Shared Electronic Banking Services Company (KNET) Abdulla Al-Ajmi is the General Manager of the Shared Electronic Banking Services Company Knet. He joined Knet within the early days of its establishment, and has lead a number of functions within Technology, Operations, and Busines groups. Al-Ajmi is aslo a member of the GCC Net council since its inception. He has presented many papers on E-payments and on KNET s roles in Kuwait, GCC, and abroad. Mr. Majed Al Adwani Unit Head - IT Security Central Bank of Kuwait Majed is a CISM, CISA, CRISC and serves as the Head of the IT Security Unit at the Central Bank of Kuwait, with the responsibility to safeguard the information at the Bank by ensuring that appropriate security controls and standards are implemented, in addition to overseeing the development and implementation of the information security framework.
12
Athens, 2 December 2011 Hellenic American Union Conference Center
Athens, 2 December 2011 Hellenic American Union Conference Center ISACA Athens Chapter and the Hellenic American Union are organizing the 1 st ISACA Athens Chapter Conference on December 2 nd, 2011. The
ISACA S CYBERSECURITY NEXUS (CSX) October 2015
ISACA S CYBERSECURITY NEXUS (CSX) October 2015 DO2 EXECUTIVE OVERVIEW Will you be a Cyber defender? ISACA launched the Cybersecurity Nexus (CSX) program earlier this year. CSX, developed in collaboration
Re: Experience with the Framework for Improving Critical Infrastructure Cybersecurity ( Framework )
10 October 2014 Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899 Re: Experience with the Framework for Improving Critical Infrastructure
State of South Carolina InfoSec and Privacy Career Path Model
State of South Carolina InfoSec and Privacy Career Path Model Start Introduction This Career Path Model for the State of South Carolina (State) is designed to help define the various career options available
The Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA
Quality and security in application development Round Table Meeting/Discussion Group Wednesday 23rd May 2007 Introduction to ISACA and ITGI By Georges Ataya, International Vice President, ISACA 1 The International
Terms of Reference for an IT Audit of
National Maritime Safety Authority (NMSA) TASK DESCRIPTION PROJECT/TASK TITLE: EXECUTING AGENT: IMPLEMENTING AGENT: PROJECT SPONSOR: PROJECT LOCATION: To engage a professional and qualified IT Auditor
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
Big 4 Information Security Forum
San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL
VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium
1 VENDOR RISK MANAGEMENT UPDATE- ARE YOU AT RISK? Larry L. Llirán, CISA, CISM December 10, 2015 ISACA Puerto Rico Symposium 2 Agenda Introduction Vendor Management what is? Available Guidance Vendor Management
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.
Profil stručnjaka za informacijsku sigurnost - certificirati se ili ne? Biljana Cerin, CISA, CISM, CGEIT, CBCP, PMP www.ostendogroup.com DA! (by Global knowledge & TechRepublic) Top certifications by salary:
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015
Cybersecurity Audit Why are we still Vulnerable? November 30, 2015 John R. Robles, CISA, CISM, CRISC www.johnrrobles.com [email protected] 787-647-3961 John R. Robles- 787-647-3961 1 9/11-2001 The event
Citation for published version (APA): Berthing, H. H. (2014). Vision for IT Audit 2020. Abstract from Nordic ISACA Conference 2014, Oslo, Norway.
Aalborg Universitet Vision for IT Audit 2020 Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication from Aalborg University Citation
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
CLASSIFICATION SPECIFICATION FORM
www.mpi.mb.ca CLASSIFICATION SPECIFICATION FORM Human Resources CLASSIFICATION TITLE: POSITION TITLE: (If different from above) DEPARTMENT: DIVISION: LOCATION: Executive Director Executive Director, Information
Executive Management of Information Security
WHITE PAPER Executive Management of Information Security _experience the commitment Entire contents 2004, 2010 by CGI Group Inc. All rights reserved. Reproduction of this publication in any form without
Partnership prospectus
Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office
Information Security Governance:
Information Security Governance: Designing and Implementing Security Effectively 2 nd Athens International Forum on Security 15 16 Jan 2009 Anestis Demopoulos, CISA, CISSP, CIA President of ISACA Athens
Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics
Developing and Enhancing Cyber Security Capabilities in the Region Khaled Gamo Technology Advisor Ministry of communication and informatics 1 Content 1 2 3 Cyber Security Strategy and Key Requirement Efforts
SMART GOVERNMENT DAYS
SMART GOVERNMENT DAYS Ulaanbaatar Mongolia, May 2-3, 2013 Smart Solutions is about identifying and scaling innovative, ICT-enabled approaches to development challenges. In this 1.5 day event the Cabinet
North Texas ISSA CISO Roundtable
North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton
ISACA Tools Help Develop Cybersecurity Expertise
Volume 21, 8 October 2014 ISACA Tools Help Develop Cybersecurity Expertise Nominate Qualified Candidates for the ISACA Board of Directors Tips for Solving Data Classification Challenges Earn CPE at Professional
Feature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant
THE MARKET LEADER IN IT, SECURITY AND COMPLIANCE SERVICES FOR COMMUNITY FINANCIAL INSTITUTIONS The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant Agenda
Chief Information Officer
Security manager Job description Job title Security manager Location Wellington Group Organisation Development Business unit / team IT Solutions Grade and salary range Pay Group 1, Pay Band 6 Reports to
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE
create better trained employees. choose the best value in training. ISACA ON-SITE TRAINING DELIVERS EXPERT INSTRUCTION AT YOUR WORKPLACE PRODUCTIVE train your workforce on-site. save on employee downtime
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors
Introduction Auditing Internal Controls in an IT Environment SOx and the COSO Internal Controls Framework Roles and Responsibilities of IT Auditors Importance of Effective Internal Controls and COSO COSO
Domain 5 Information Security Governance and Risk Management
Domain 5 Information Security Governance and Risk Management Security Frameworks CobiT (Control Objectives for Information and related Technology), developed by Information Systems Audit and Control Association
The enemies ashore Vulnerabilities & hackers: A relationship that works
The enemies ashore Vulnerabilities & hackers: A relationship that works Alexandros Charvalias, Manager CISSP, CISA, ACDA Assurance & Enterprise Risk Services Cyber security maturity model How effectively
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Advanced IT Audit Training
Advanced IT Audit Training Date: 28 th 30 th October 2014 Time: 8.30 am to 5.30 pm Venue: Iverson Associates, Center Point, Bandar Utama, Kuala Lumpur Advanced IT Audit Training Workshop Overview ISACA
Security Transcends Technology
INTERNATIONAL INFORMATION SYSTEMS SECURITY CERTIFICATION CONSORTIUM, INC. Career Enhancement and Support Strategies for Information Security Professionals Paul Wang, MSc, CISA, CISSP [email protected]
DIGITAL ENTERPRISE TRANSFORMATION (DET) SUMMIT, 2015
DIGITAL ENTERPRISE TRANSFORMATION (DET) SUMMIT, 2015 Overview We find ourselves in the thick of the Digital Revolution. Riding on the back of a broadband economy, there is a growing emphasis on creating
Don t Get Left in the Dust: How to Evolve from CISO to CIRO
SESSION ID: CXO-W04 Don t Get Left in the Dust: How to Evolve from CISO to CIRO JC-JC James Christiansen VP Information Risk Management Accuvant [email protected] Bradley J. Schaufenbuel, CISSP
Glimpses of Media coverage of the 3 rd Business & IT Resilience Summit 2014, Dubai
SPECIAL ADDRESS 1: Dr. Saif Al Dhaheri, Director Safety & Prevention, NCEMA Some of our distinguished speakers SPECIAL ADDRESS 2: Steve Mellish, who has just finished his 2-year term as The BCI Global
3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security
Communications Regulatory Authority of the Republic of Lithuania European Security Round Table Microsoft Venue: 3 rd Informal Cyber Security Experts Forum Round Table discussion on Cyber Security Agenda
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Val-EdTM. Valiant Technologies Education & Training Services. 2-day Workshop on Business Continuity & Disaster Recovery Planning
Val-EdTM Valiant Technologies Education & Training Services 2-day Workshop on Business Continuity & Disaster Recovery Planning All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies.
INFORMATION SECURITY STRATEGIC PLAN
INFORMATION SECURITY STRATEGIC PLAN UNIVERSITY OF CONNECTICUT INFORMATION SECURITY OFFICE 4/20/10 University of Connecticut / Jason Pufahl, CISSP, CISM 1 1 MISSION STATEMENT The mission of the Information
Key Considerations of Regulatory Compliance in the Public Cloud
Key Considerations of Regulatory Compliance in the Public Cloud W. Noel Haskins-Hafer CRMA, CISA, CISM, CFE, CGEIT, CRISC 10 April, 2013 [email protected] Disclaimer Unless otherwise specified,
Regional Conference on Factoring in Asia
IFG REGIONAL CONFERENCE: Regional Conference on Factoring in Asia International Conference On Factoring And Other Receivables Finance Products Singapore / Tuesday, 28 October 2014 Factoring continues to
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
Why CISM? Who Earns CISM Certification? CISA, CISM and CGEIT Program Accreditation Renewed Under ISO/IEC 17024:2003
The Certified Information Security Manager (CISM) certification is a unique management-focused certification that has been earned by more than 16,000 professionals since its introduction in 2003. Unlike
REGISTER AT IIF.COM/TRAINING
IIF EXECUTIVE PROGRAM ON PRIVATE BANKING AND WEALTH MANAGEMENT Evolving Wealth Transformation in Dynamic Growth Markets November 16-17, 2015 Singapore IN COOPERATION WITH COURSE DESCRIPTION IIF EXECUTIVE
OPENTEXT GLOBAL FAX SUMMIT 2011
OPENTEXT GLOBAL FAX SUMMIT 2011 Tuesday, July 12 th and Wednesday July 13 th, 2011 Customer Workshops and Partner Day, Thursday, July 14 th, 2011 Westin La Paloma Resort & Spa, Tucson, Arizona SUMMIT AGENDA
Making our Cyber Space Safe
Making our Cyber Space Safe Ghana s Emerging Cyber Security Policy & Strategy William Tevie Director General 5/28/2014 1 Agenda Cyber Security Issues Background to Policy Target Audience for Framework
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk
Database Security and Auditing
Database Security and Auditing COURSE DESCRIPTION: This seminar aims to provide the Database Administrators, System Administrators, Auditors and IT Security Officers an overview on how to secure and audit
Chayuth Singtongthumrongkul
IT is complicated. IT Governance doesn t have to be. Chayuth Singtongthumrongkul CISSP, CISA, ITIL Intermediate, PMP, IRCA ISMS (ISO/IEC 27001) Director of International Academic Alliance, ACIS Professional
Saudi Arabia income tax and zakat update Refreshing perspectives
Al-Khobar Monday, December 7, 2015 Riyadh Tuesday, December 8, 2015 Jeddah Wednesday, December 9, 2015 Saudi Arabia income tax and zakat update Refreshing perspectives Seminar details The imperative Globalization
It s all about Europe s future with Cloud. EUROCLOUD FORUM 2015. 6 th EuroCloud Congress Barcelona, October 7 9
It s all about Europe s future with Cloud. EUROCLOUD FORUM 2015 6 th EuroCloud Congress Barcelona, October 7 9 EuroCloud Europe is the European umbrella organization of more than 20 national EuroCloud
Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director
Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director 2 Thanks To the ITU for sponsoring the initiative ictqatar has worked closely with the ITU-D since the project s inception,
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
Aalborg Universitet. Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus. Publication date: 2014
Aalborg Universitet Cyber Assurance - what should the IT auditor focus on? Berthing, Hans Henrik Aabenhus Publication date: 2014 Document Version Early version, also known as pre-print Link to publication
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot
Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001
Invitation for Continuing Professional Education Session On January 11, 2014 (Saturday) Venue : Conference Hall, Second Floor YMCA Building Jai Singh Marg, Connaught Place, New Delhi -110001 Time: 02:30
Vendor. Management. For sponsorship or to become our partner, contact: [email protected]
Knowledge Partner Presents 27th May 2015 - Bengaluru 5th June 2015 - New Delhi 24th June 2015 - Mumbai Vendor Risk Management For sponsorship or to become our partner, contact: [email protected]
Put your Head in the Cloud at Phorum
Put your Head in the Cloud at Phorum There is no question that cloud computing and cloud strategies are at the forefront of many business leaders minds and budgets. CxOs have their heads in the clouds,
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013
Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA [email protected] 11.16.2013 AGENDA IT s Changing Landscape ISACA s Response Vision and Mission COBIT 5
0830 0845 Welcome Remarks, IDMA President, Dana Reynolds, SAC Ravenelle
Session: Program on Risk Management Date: Thursday, March 26, 2015 Schedule: 0800 0830 Registration, Beverage and Breakfast Service 0830 0845 Welcome Remarks, Dana Reynolds, SAC Ravenelle 0845 1200 Main
Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA
Hans Henrik Berthing, CPA, CISA, CGEIT, CRISC, CIA HANS HENRIK BERTHING Married with Louise and dad for Dagmar and Johannes CPA, CRISC, CGEIT, CISA and CIA ISO 9000 Lead Auditor Partner and owner for Verifica
GSR 13. 4th Generation regulation: driving digital communications ahead
GSR 13 4th Generation regulation: driving digital communications ahead 3-5 July 2013 Hilton Warsaw Hotel Warsaw, Poland Organized by the International Telecommunication Union (ITU), in collaboration with
Governance and Management of Information Security
Governance and Management of Information Security Øivind Høiem, CISA CRISC Senior Advisor Information Security UNINETT, the Norwegian NREN About Øivind Senior Adviser at the HE sector secretary for information
Regulatory Issues - Review of the Cullen International Economic System
MASTERING EUROPEAN AUDIOVISUAL REGULATION A two-day training course Organised by Cullen International The training will provide attendees with: key market data on the audiovisual sector a historical perspective
IT Charter and IT Governance Framework
IT Charter and IT Governance Framework Status: Custodian: Approved Director: Information Technology Date approved: 2013-12-04 Implementation date: 2013-12-05 Decision number: SAQA 02102/13 Due for review:
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral
Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM
Stepping Through the Info Security Program Jennifer Bayuk, CISA, CISM Infosec Program How to: compose an InfoSec Program cement a relationship between InfoSec program and IT Governance design roles and
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA
CYBERSECURITY NEXUS ROBERT E STROUD INTERNATIONAL PRESIDENT, ISACA RAMSÉS GALLEGO INTERNATIONAL VICE PRESIDENT, ISACA Robert Stroud International President, ISACA VP Strategy & Innovation, CA Technologies
SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles
PNNL-24138 SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles March 2015 LR O Neil TJ Conway DH Tobey FL Greitzer AC Dalton PK Pusey Prepared for the
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Information Security Principles and Practices
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 3: Certification Programs and the Common Body of Knowledge Certification & Information Security Industry standards,
Guideline for Roles & Responsibilities in Information Asset Management
ISO 27001 Implementer s Forum Guideline for Roles & Responsibilities in Information Asset Management Document ID ISMS/GL/ 003 Classification Internal Use Only Version Number Initial Owner Issue Date 07-08-2009
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE
HOW TO ADDRESS THE CURRENT IT SECURITY SKILLS SHORTAGE ISACA S CYBER SECURITY NEXUS Ivan Sanchez-Lopez Senior Manager Information Security, IT Risk & Continuity, DHL Global Forwarding ISACA Luxembourg
IT Vendor Due Diligence. Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014
IT Vendor Due Diligence Jennifer McGill CIA, CISA, CGEIT IT Audit Director Carolinas HealthCare System December 9, 2014 Carolinas HealthCare System (CHS) Second largest not-for-profit healthcare system
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP
2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf
Diligence Management Consultants Company profile. Middle East - Africa - South Asia
Diligence Management Consultants Company profile Middle East - Africa - South Asia Chapter 1 Who we are Established in 2008 in the United Arab Emirates, Diligence has emerged as the primary security and
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Cyber-Physical System Security of the Power Grid
Course on: Cyber-Physical System Security of the Power Grid April 9-11, 2013 at KTH Royal Institute of Technology, Stockholm, Sweden Background Cyber Security is essential to today s power grid operation
ITWeb Business Intelligence Summit 2016 - Marketing opportunities
1 CONTENTS Section A - General Information... 3-4 Section B - Demographics... 5-6 Section C - Sponsorship options... 8-20 Sponsorship options... 9-16 Other promotional opportunities... 17-18 Floorplan...
