Working Towards the 2020 Tokyo Olympics
|
|
|
- Cordelia Webster
- 10 years ago
- Views:
Transcription
1
2 Working Towards the 2020 Tokyo Olympics - The Current Situation in 2015 Mariko Miya Cyber Defense Institute, Inc. [email protected]
3 Agenda 1. Introduction 2. The current situation in Japan 2015 Analytics and general framework New framework & new cybersecurity strategy Government initiatives for Tokyo 2020 TOCOG 3. Next steps in preparing for 2020 Comparing London 2012 and Tokyo 2020 Other aspects that may affect the Games in 2020 and evidence The changing threat landscape 4. Lessons learned Lessons learned from research A recent incident tells us we have to make change 5. Conclusion
4 1. Introduction
5 About Cyber Defense Institute Cyber Defense Institute, Inc. Based in Tokyo, Japan 30+ people What we do: incident response, penetration testing, digital forensics, malware analysis, training, cyber exercises, security research, cyber intelligence etc. Main clients: government and private sector (energy, nuclear, gas, financial institutions, telecom, web service providers (from e-commerce to games) etc.)
6 About me (Mariko Miya) What do I do? Chief Security Analyst I travel, say hello to people, research, report How are we involved in the Tokyo 2020 Games? I ve been doing research on the past Olympics/ Paralympics and other major sports events since 2013 Clients: government agencies and organizations directly involved with Tokyo Games
7 2. The current situation in Japan 2015
8 Cyber attacks in Japan According to NICT (National Institute of Information and Communications Technology): In 2013, there were about billion alerts In 2014, there were about billion alerts related to cyber attacks targeting Japanese government agencies and private companies ü NICT analyzed data collected from 240,000 sensors IPA s report 10 Major Security Threats in 2014 ü Part of the real-,me live traffic collected from the NICTER (Network Incident analysis Center for Tac,cal Emergency Response) project can be seen on the website: hep://
9 Cyber Security Basic Law and Government in terms of cyber New: Informa,on Security Policy Council Cybersecurity Strategy Headquarters Prime Minister Cabinet Office Cabinet Secretariat Cybersecurity Strategy Headquarters NISC Restructured: Na,onal Informa,on Security Center (NISC) Na,onal center of Incident readiness and Strategy for Cybersecurity (NISC) Cybercrime Na,onal Security Foreign Affairs, Policy Network and Communica,on IT Policy Special Inves,ga,on Task Force for Cyber AEacks Cyber Defense Unit
10 A new Cyber Strategy (draft)* Will be finalized at the end of June This strategy looks beyond the 2020 Tokyo Games and lays out the direction of basic cyber policy for the next 3 years 5 basic principles: Freedom of information Rules and norms Openness Autonomy Cooperation hep://
11 Government Initiatives for 2020 National Police Agency (NPA) 2020 Olympic and Paralympic Tokyo Games Preparation Office Tokyo Metropolitan Police Department TMPD s Visions to achieve the World s Safest City Tokyo and Action Plan Ministry of Internal Affairs and Communications 2020 Olympic and Paralympic Tokyo Games etc. Ministry of Internal Affairs and Communications Preparation Headquarters Proposal for Cyber Security Policy Promotion Ministry of Defense Ministry of Defense and Self Defense Force 2020 Tokyo Olympic and Paralympic Games Special Action Committee Ministry of Land, Infrastructure, Transport and Tourism Ministry of Land, Infrastructure, Transport and Tourism 2020 Olympic/Paralympic Tokyo Tokyo Games Preparation Committee
12 Japan s unique system Japan has a unique system of outsourcing Government(s) and private sector are distantly related
13 About TOCOG Tokyo Organizing Committee of the Olympic and Paralympic Games (TOCOG) Launched Jan 24, 2014 Mission: Act as the center bringing together the JOC (Japan Olympic Committee), JPC (Japan Paralympic Committee), the Tokyo Metropolitan Government, other government and business community to ensure the successful delivery of the Tokyo 2020 Games ü Technology Services Department System development and operations ü Security Department, Cyber Attack Response Section in charge of running TOCOG-CSIRT ü General Affairs Department overall risk management
14 Next steps for TOCOG Coordinating with the Olympic CERT (To be established by Japanese governments) TOCOG CSIRT protecting Games infrastructure Olympic CERT intelligence gathering, analysis, incident response, coordination Enhancing cyber intelligence capabilities Creating an intelligence database & system Cyber exercises and simulation Idea : creating a simulated Olympic network for a hacking contest
15 TOCOG s Goals Protect not only the Games systems but secure all systems (government, critical infrastructure, companies, etc.) = protecting Japan s reputation Training and securing cybersecurity experts Key is sustainability not only for Tokyo 2020 but to continue training and developing experts, and make needs more wide spread = nurturing cybersecurity experts for the future
16 3. Next step in preparing for 2020
17 Comparing and analyzing from past experiences Example: Major differences between London 2012 and Tokyo Communication (network) interception 2. Mobile devices and Wi-Fi traffic 3. Terrorist organizations and cyberspace 4. Impact of cyber attacks on businesses
18 Major differences between London 2012 and Tokyo Communication (network) interception Intelligence agencies and law enforcement implemented communica,on (network) intercep,on according to an,- terrorism laws (intelligence agencies and law enforcement have response capabili,es against poten,al threats) Law enforcement can only implement intercep,on methods according to court order (response capabili,es of law enforcement depend on detec,on, judgment and response capabili,es of targeted organiza,ons)
19 Major differences between London 2012 and Tokyo Mobile devices and Wi-Fi traffic It was the transi,on phase of drama,c increase smartphone and tablet use, so the amount in increase of Wi- Fi traffic was within expecta,ons In addi,on to smartphones and tablet devices, rapid increase in the usage of cloud applica,ons and wearable devices is expected, and it is extremely difficult to es,mate the amount of traffic in 2020
20 Major differences between London 2012 and Tokyo Terrorist organizations and cyberspace Illegal / criminal ac,vi,es using cyberspace was somewhat limited rapid increase in illegal / criminal ac,vi,es using cyberspace is expected (an easily accessible environment is being con,nually being built at an accelera,ng pace)
21 Major differences between London 2012 and Tokyo Impact of cyber attacks on businesses Legacy systems were intermixed, so business impact was limited Fewer legacy systems, and it is likely that there will be dependency on extremely efficient or highly produc,ve systems, so business impact will be extremely high
22 What do we need to watch out for in 2020? Terrorism Insider threats Cyber incidents that may be triggered by geopoli,cal / historical / poli,cal issues Olympic Sponsors as target Public Wi- Fi Natural disaster
23 Case examples - 1 Terrorism ISIL supporters defaced several Japanese websites in March 2015 Cyber incidents that may be triggered by geographical / historical / political issues
24 Case example 2 Olympic sponsors as target Example 1 London 2012 Atos was targeted as part of physical protest Example 2 Sochi 2014 Anonymous Caucasus targeted Sochi Games related websites sochi-airport.com, Sberbank also targeted, websites service failure occurred several times Example 3 FIFA World Cup Brazil Anonymous - list of attack targets in #OpHackingCup FIFA Partner (Adidas, CocaCola, Hyundai, KIA, Emirates Airlines) FIFA Sponsors (Budweiser, Castrol, Johnson&Johnson, McDonalds etc.) National supporters (FIFA.com, Apex-Brasil, Centauro, Garoto) etc.
25 Case examples 3 Natural Disaster Example: targeted attack taking advantage of people s interests right after the 3.11 East Japan Earthquake and Fukushima No.1 Nuclear Power Plant accident Subject: March 30 th Condi,on of Radia,on Body: <blank> AEached file: March 30 th Condi,on of Radia,on.doc
26 Changing threat actors Nation States Patriot Hackers Individuals or Groups Hybrid Conflict Hybrid Conflict (Trans)national Terrorism Prolifera)on/ Money Laundry Slide by Mr.Wolfgang Roehrig, European Defense Agency
27 4. Lessons learned
28 Past Present Future Collaboration and Information Sharing 2008 Beijing (Summer) Games 2010 Vancouver (Winter) Games 2012 London (Summer) Games 2014 FIFA World Cup Brazil 2014 Sochi (Winter) Games 2015 Summer - the First European Games in Baku, Azerbaijan (June 12-28!) 2015 Summer - Pan Am & Parapan Am Games in Toronto, Canada (Pan Am: July 10-26, Parapan Am: August 7-15!) 2016 Rio (Summer) Games 2018 FIFA World Cup Russia 2018 Pyeongchang (Winter) Games
29 Lessons learned and some ideas we got from our research Clearance and stress test for Gmes staff (i.e. BT during London Olympics) New methods for Accreditation Collaboration for cyber preparedness and response (i.e. cyber exercises with other well experienced organizations like experts from Cyber-EXE Poland exercises) Enhance collaboration for information sharing and strengthen analysis capabilities for every day intelligence collection
30 An example of a learned lesson: Don t use barcodes for Accreditation! hep://mariskarichters.com/the- olympic- spirit- project/ hep:// from- olympic- sochi/ hep:// %E3%82%B9%E5%86%99%E7%9C%9F/mens- figure- skater- yuzuru- hanyu- of- japan- shows- his- %E3%83%8B%E3%83%A5%E3%83%BC%E3%82%B9%E5%86%99%E7%9C%9F/ Be#er op(ons: Use smart chips instead Link with passport
31 A recent incident Japan Pension Service (JPS) data breach 1.25 million files containing personal information was leaked 1.17 million items included 10 digit ID numbers in National Pension Plan and Employee s Pension Plan, names, birthdate 52,000 items included 10 digit ID numbers, names, birthdate, address 31,000 included ID numbers, names Method : targeted attack There s wonderful services, technology, products in the world, and no matter how much technology advances, there s no point if it s not operational for the users = user level cybersecurity = raising the level for EVERYONE hep:// OYT8T50011.html
32 5. Conclusion
33 Conclusion More deep Cooperation and Collaboration Cyber security for EVERYONE (we re all connected!) We can work together to secure not only Tokyo 2020 but make a step towards Improving the Future
34 Mariko Miya Thank you!
Cyber Security in Japan (v.2)
Cyber Security in Japan (v.2) Ryusuke Masuoka ([email protected]) and Tsutomu Ishino ([email protected]) Cyber Security Policy Research Team Center for International Public Policy Studies (CIPPS) December
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency
The Policy Approaches to Strengthen Cyber Security in the Financial Sector (Summary) July 2, 2015 Financial Services Agency 1 Challenge for Cyber Security in Financial Sector (1) Necessity to Strengthen
Preventing & Mitigating Potential Threats at Large-Scale Events: A look at past & future plans involving the Olympics & Super Bowl
Preventing & Mitigating Potential Threats at Large-Scale Events: A look at past & future plans involving the Olympics & Super Bowl 13:30-14:30, Wednesday, 16 September 2015 The World Bank D.C. Headquarters,
LONDON 2012: CYBER SECURITY
LONDON 2012: CYBER SECURITY SHARING OUR EXPERIENCES Oliver Hoare Former Head of Cyber Security Government Olympic Executive UNCLASSIFIED 1 GREAT BRITAIN CONGRATULATES TOKYO 2020 UNCLASSIFIED THEMES Scale
MAJOR EVENTS COORDINATION UNIT
1 UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY MAJOR EVENTS COORDINATION UNIT 2 1 THE BUREAU OF DIPLOMATIC SECURITY (DS) IS THE SECURITY AND LAW ENFORCEMENT ARM OF THE U.S. DEPARTMENT
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Cybersecurity Strategy in Japan
Cybersecurity Strategy in Japan Jan 21, 2015 Hiroshi Kawaguchi, CISSP Little earth Corporation Co., Ltd. Chief Evangelist hiroshi.kawaguchi @ lac.co.jp What is this? 2 Global Risks 2014 http://www3.weforum.org/docs/wef_globalrisks_report_2014.pdf
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Viewpoint: Implementing Japan s New Cyber Security Strategy*
Presented by: The ACCJ s Internet Economy Task Force Valid Through November 2014 The 2013 Cyber Security Strategy, released in June 2013, and the International Strategy on Cybersecurity Cooperation, released
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
An Overview of Cybersecurity and Cybercrime in Taiwan
An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication
New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector
New York State Department of Financial Services Report on Cyber Security in the Insurance Sector February 2015 Report on Cyber Security in the Insurance Sector I. Introduction Cyber attacks against financial
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
Cyber security Country Experience: Establishment of Information Security Projects.
Cyber security Country Experience: Establishment of Information Security Projects. Mr. Vincent Museminali [email protected] Internet and New media regulations Rwanda Utilities Regulatory Authority
The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
Computer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
Cyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest [email protected] Abstract Nowadays, the boundary between virtual
Data Analytics & Information Security
Data Analytics & Information Security About The Speaker Practice Director at ERM M.S. Information Networking and Security CERT Coordination Center - Carnegie Mellon University Carnegie Mellon CyLab Agenda
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Cyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department November 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
National Cyber Crime Unit
National Cyber Crime Unit Kevin Williams Partnership Engagement & National Cyber Capabilities Programme [email protected] Official Problem or opportunity Office for National Statistics In
The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in 2012-2015:
COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR Kapitel 1 TERRORIST PURPOSES GEORGIA January 2013 www.coe.int/terrorism A. National policy 1. Is there a national
Cyber security trends & strategy for business (digital?)
Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST
CYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
CERT.AZ description as per RfC 2350
CERT.AZ description as per RfC 2350 Contact Cyber Security Center (CSC) Computer Emergency Response Team (CERT) Address Block 702, Drogal lane Baku, Azerbaijan Telephone: +99412 4932056 +99412 4932057
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE
THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual
El Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
THE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
Protecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
What Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 [email protected] Presented by: Rob D. Moseley, Jr. 2 West
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
Main Research Gaps in Cyber Security
Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis
Testing the Security of your Applications
Home Safeguarding Business Critical Testing the of your Applications Safeguarding business critical systems and applications 2 Safeguarding business critical systems and applications Organizations are
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
How To Write A National Cybersecurity Act
ROCKEFELLER SNOWE CYBERSECURITY ACT SUBSTITUTE AMENDMENT FOR S.773 March 17, 2010 BACKGROUND & WHY THIS LEGISLATION IS IMPORTANT: Our nation is at risk. The networks that American families and businesses
How To Protect Critical Infrastructure
Cybersecurity Strategy in Japan October 9th 2014 Yasu TANIWAKI Deputy Director-General National Information Security Center (NISC) Government of JAPAN Big Data Society and Cybersecurity Open data Digitally
Cybersecurity Protecting Yourself, Your Business, Your Clients
Cybersecurity Protecting Yourself, Your Business, Your Clients Global Summit of Women June 7, 2014 Celina B. Realuyo Professor of Practice of National Security Affairs William J. Perry Center for Hemispheric
ASEAN s Cooperation on Cybersecurity and against Cybercrime
ASEAN s Cooperation on Cybersecurity and against Cybercrime Presentation by the ASEAN Secretariat Octopus Conference: Cooperation Against Cybercrime 4 December 2013, Strasbourg, France Outline ASEAN Mechanisms
The Battlefield. critical infrastructure:
CIP A Business View Rolf Schulz CEO Definition critical infrastructure: 1. Elements of a system that are so vital that disabling any of them would incapacitate the entire system. 2. [In security,] those
Cyber and Mobile Landscape, Challenges, & Best Practices
Cyber and Mobile Landscape, Challenges, & Best Practices while increasing efficiencies through automation Cheri McGuire VP, Global Govt. Affairs & Cybersecurity Policy Cyber and Mobility Challenges and
Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU
Cybersecurity Global status update Dr. Hamadoun I. Touré Secretary-General, ITU Cybercrime takes a toll on the global economy - Online fraud, identity theft, and lost intellectual property; - On governments,
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response
Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Incident Response What is the most importance component of an Incident Response Program? Tools? Processes? Governance?
Contact Points on Government Procurement as of January 1, 2005
Contact Points on Government Procurement as of January 1, 2005 A. Entities Covered by the Agreement on Government Procurement House of Representatives Accounts Div., General Affairs 03(3581)5111 2323 House
Establishing a State Cyber Crimes Unit White Paper
Establishing a State Cyber Crimes Unit White Paper Utah Department of Public Safety Commissioner Keith Squires Deputy Commissioner Jeff Carr Major Brian Redd Utah Statewide Information & Analysis Center
Cybercrime Security Risks and Challenges Facing Business
Cybercrime Security Risks and Challenges Facing Business Sven Hansen Technical Manager South Africa East Africa Security Conference August 2013 1 Agenda 1 What is Cyber Crime? 2 Cyber Crime Trends 3 Impact
Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
The OSCE Efforts in the Field of Cyber Security and Protecting Critical Energy Infrastructure from Terrorist Attacks
Critical National Infrastructure Conference London, 21-22 April 2015 The OSCE Efforts in the Field of Cyber Security and Protecting Critical Energy Infrastructure from Terrorist Attacks Address by Mr.
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada
El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada The Traditional Approach is Changing. Security is no longer controlled and enforced through the
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
Lessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014
A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1 Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta,
2. Cyber security research in the Netherlands
2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed
Home Security: Russia s Challenges
Home Security: Russia s Challenges A Russian Perspective Andrei Fedorov * Home security: Russia s challenges Home security and the struggle against terrorism is one of the most crucial issues for the Russian
Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.
MAJOR FINANCIAL SERVICES LEADER Top 5 Global Bank Selects Resolution1 for Cyber Incident Response. Automation and remote endpoint remediation reduce incident response (IR) times from 10 days to 5 hours.
Egyptian Best Practices Securing E-Services
Egyptian Best Practices Securing E-Services Dr. Sherif Hazem Nour El-Din Information Security Systems Consultant Root CA Manager, ITIDA Agenda Security Measures for E-Services Examples of E- Services Threats
integrating cutting-edge security technologies the case for SIEM & PAM
integrating cutting-edge security technologies the case for SIEM & PAM Introduction A changing threat landscape The majority of organizations have basic security practices in place, such as firewalls,
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services
www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Design Your Security
Design Your Security We build tailored, converged security for you. converged Technology. Strategy. People. The synergetic collaboration. agile Hackers sleep - we don t. We re ready whenever, wherever.
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
London 2012 Olympic Safety and Security Strategic Risk. Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments
London 2012 Olympic Safety and Security Strategic Risk Assessment (OSSSRA) and Risk Mitigation Process summary Version 2 (January 2011) Updated to reflect recent developments Introduction London 2012
The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
GOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended
As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended Global Cybercrime has an estimated cost of US$ 110 Billion per year Every second, 18 adults become a
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
REPUBLIC OF TURKEY. Ministry of Transport, Maritime Affairs and Communications. National Cyber Security Strategy and 2013-2014 Action Plan
REPUBLIC OF TURKEY Ministry of Transport, Maritime Affairs and Communications National Cyber Security Strategy and 2013-2014 Action Plan [The page intentionally left blank.] National Cyber Security Strategy
Executive Director Centre for Cyber Victim Counselling www.drjaishankar.co.nr / www.cybervictims.org
Dr. K. Jaishankar Senior Assistant Professor Department of Criminology and Criminal Justice Manonmaniam Sundaranar University Tirunelveli, Tamil Nadu, India Executive Director Centre for Cyber Victim Counselling
TUSKEGEE CYBER SECURITY PATH FORWARD
TUSKEGEE CYBER SECURITY PATH FORWARD Preface Tuskegee University is very aware of the ever-escalating cybersecurity threat, which consumes continually more of our societies resources to counter these threats,
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
provisions specified by the Preventive Law, the Cabinet of Ministers of Azerbaijan Republic has adopted the following decisions:
REPORT of the Financial Monitoring Service under the Central Bank of the Republic of Azerbaijan on execution of The 2007-2011 Action Plan for implementation of the National Strategy for Combatting Corruption
Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]
Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
International Strategy on Cybersecurity Cooperation
資 料 9-2 International Strategy on Cybersecurity Cooperation - j-initiative for Cybersecurity - October 2, 2013 Information Security Policy Council Contents 1 Objectives 1 2 Basic Principles 2 2.1 Ensuring
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
