IT Governance, Audit & Information Security

Size: px
Start display at page:

Download "IT Governance, Audit & Information Security"

Transcription

1 Two intensive one day events to drive business value through IT IT Governance, Audit & Information Security Incorporating the ISACA Chapter Annual Conference 29 March 2010, Hyatt Regency, With contributions from: Audit NZ Government Communications Security Bureau Ports of Westpac Air New Zealand Office of the Privacy Commissioner and more! Discussing critical IT success factors such as: IT and Business Alignment Implementing Governance Frameworks IT Risk Assessments Audit and Compliance With a keynote International Address from: Mark Toomey, Author of Waltzing with the Elephant and Principal of INFONOMICS PTY LTD Bright*Star s 15th Annual Information & IT Security 30 March 2010, Hyatt Regency, Protect your business against a growing number of increasingly complex cyber threats Covering all aspects of IT and Information Security such as: Mobile Security Threat Detection and Forensics PCI-DSS Compliance Security Outsourcing Web Security With contributions from: NZ Police The Warehouse Telecom Deloitte Insomnia Security Secure your place today! Call (09) » Fax (09) » register@brightstar.co.nz» Online

2 IT Governance, Audit & Information Security 29 March 2010, Hyatt Regency, Incorporating the ISACA Chapter Annual Conference 8.30 Registration & Coffee 9.00 Opening Remarks from the Chair Chandan Ohri, Director Information Systems, BDO - AUCKLAND and President, ISACA AUCKLAND CHAPTER 9.10 KEYNOTE INTERNATIONAL ADDRESS: IT Audit and Governance in a Post-Recession World As the global economy recovers from one of the worst recessions to hit us in nearly a century, more than ever it is critical to deliver as much value as possible from technology-enabled investments. The new environment is extremely sensitive to risk, but at the same time must invest in new opportunities to harness growth and value. This value can be attained through sound governance and management of information technology as a key enabler of business performance. The changing responsibilities of business leaders as they come to terms with the fact that deriving value from IT is increasingly a question of how it is used in enabling the business The implications of this change for IT Audit, and how it is used in enabling business value The risks and opportunities that the new environment presents Mark Toomey, Author of Waltzing with the Elephant and Principal of INFONOMICS PTY LTD Missing in Action: The IT Risk Assessment Why do most New Zealand organisations completely fail to take IT risk into account when doing their regular risk reviews and assessments? Does the senior management team put it in the too hard basket? Or is it seen as solely an IT problem instead of an organisation-wide risk issue? This session will explain: Why most organisations fail to undertake strong IT risk assessment procedures Risk assessment as a starting point for audit and governance good practice Risk as a platform for opportunity and threat management in support of achieving business strategy Chris Roberts, Senior Advisor, GOVERNMENT COMMUNICATIONS SECURITY BUREAU Morning Break & Refreshments Customise your learning experience with our breakout streams. Attend the most relevant sessions to you and maximise your learning experience! Theme: Governance Resolving your IT Governance Dilemma: A leg up to get started Getting started on the journey towards improved IT Governance can be half the battle. Tools, methodologies, frameworks can see too much time spent planning and not enough in execution. This session will outline techniques to: Kick-start the journey Raise awareness and gain support Highlight elements from the frameworks that support quick wins Outline lessons learned in the field Liz Wickham, Executive Director IT Risk and Assurance, ERNST & YOUNG Kevin Maloney, Director, THE POINT GROUP Theme: Governance CASE STUDY: How do I Improve my IT Governance? Many IT governance initiatives have been focused on achieving compliance driven by external mandates. While compliance is important, business value will be lost if the right things are not effectively governed and managed. So where to start? This session will help you understand the key steps for getting beyond the tech speak. Come away with an understanding of the three things that will help you, your Board and key stakeholders sleep peacefully at night. Kevin McCaffrey, Partner, and Jeremy Bendall, Partner, EFFECTIVE GOVERNANCE NZ LTD Theme: Audit Defining and Planning the Scope of your IT Audit One of the areas that an IT audit can fall down is that the scope is incorrectly defined. By focussing too heavily on the supply-side issues of an IT audit, rather than the demand, you lose sight of the real aim of an audit to ensure your IT investments deliver value for money to the business. This session will investigate: The risks associated with an ill-defined IT Audit Projecting future demands on IT usage to develop your investments with forethought Thoughts on a well structured and defined IT audit Vaughan Harrison, Senior Manager, ERNST & YOUNG Theme: Security Linking Information Security with Information Risk Management To be truly successful, information security must have robust internal controls, backed by strong metrics. As information security continues to evolve into a critical function, we will examine how internal controls and processes can be embedded in your organisation. Sound policy as a base for information security Benchmarking your policies with an internal security audit What metrics can you employ to give you an accurate dashboard of your progress? Tony Krzyzewski, Director and Jackie Krzyzewski, Director, KAON TECHNOLOGIES

3 12.50 Lunch Break 1.40 Theme: Security An Organisational Model for Information Security Assessment As the importance of information and the supporting technology has increased, so too has the imperative to ensure its security. A comprehensive and effective security assessment framework is thus vital to both corporate governance and management of security spending and investment. However, there is little evidence that such a framework is either available or widely adopted. In this session, a conceptual model for security assessment is presented together with an indication of its application which extends beyond the regular jurisdiction of the COBIT model. Jeremy McKissack, Manager Information Security, WESTPAC Theme: Governance CASE STUDY: IT Governance in Action IT Governance principles look good in a book or website. Getting them off the page and into your organisation can be a very different proposition. Gain insight into how the Ports of have approached the initial transformation and continual improvement of their IT Department and IT governance, including: Leadership challenges encountered and key success factors Performance measurement and stepping stones along the journey Activities to continually improve IT governance What s ahead in longer term plans Richard Raj, Manager Group Project Office & IT Services, PORTS OF AUCKLAND 2.25 Theme: Audit IT Risk Management and the IT Auditor The ability to aggressively take strategic and commercial risk and yet manage the associated operational risks is a critical skill for success in business today. While the management of risk exposures is reasonably well entrenched in business processes, the management of IT infrastructure and channel related risks - even where that infrastructure supports critical supply and market activity - is less developed. Often unrecognised by the executive team, it is beholden on the IT team and in particular the IT Auditor to understand IT risk and the effectiveness of the associated controls, put in place the right programmes and to - most critically - communicate. Shahvez David, Director, SJD CONSULTING & Geraint Bermingham, Director, NAVIGATUS RISK CONSULTING Theme: Governance Involving the Board in your IT Governance IT Governance, like all other areas of corporate governance, is ultimately the responsibility of the board. However members of the board often pay scant attention to current and future use of IT compared with other governance fields. This can often lead to IT governance not being aligned with overall business direction, leading to inefficiencies and lost value. Are boards instinctively technophobic? Reframing the questions from IT towards the acceptable use of IT Involving the board in IT risk assessment Alan Clifford, Director, Information Systems Audit & Assurance, AUDIT NZ 3.10 Afternoon Break & Refreshments 3.30 PANEL DISCUSSION: IT Audit: The Auditee s View Security Audits must be undertaken with an overarching view of the needs to the audited business. An audit that that doesn t cover specific pain points the organisation may have, is less likely to be acted on and implemented. This Panel brings together IT and Audit Managers from a variety of organisations to discuss their experiences with IT audit. To what degree could we (and did we) address the issues the IT audit raised? Ensuring your auditor works well within your team and overcomes organisational barriers What would we do differently next time? What were our expectations coming in to the audit and how were they met? Jeremy McKissack, Manager Information Security, WESTPAC Ed Overy, Group General Manager IT, AIR NEW ZEALAND Richard Raj, Manager Group Project Office & IT Services, PORTS OF AUCKLAND Facilitated by: Chandan Ohri, Director Information Systems, BDO - AUCKLAND and President, ISACA AUCKLAND CHAPTER 4.15 Address from the Privacy Commissioner s Office The IT Audit, Security and Governance professional s role also encompasses the protection of the interests of parties external to the organisation. When employing new technologies, you need to be constantly aware of how they will impact on the privacy rights of staff, customers, suppliers and the general public. Developing security and IT governance policies around social networking How to stay legally compliant and secure in the privacy arena Issues on what information can go into the public domain The IT security and governance professionals role as the guardian of data Katrine Evans, Assistant Commissioner, OFFICE OF THE PRIVACY COMMISSION 5.00 Summary Remarks from the Chair and Close of Conference followed by Networking Drinks PROMOTIONAL OPPORTUNITIES AT THIS EVENT! Get in front of your target market and promote your products and services! Call Dominic Duncan on , or dduncan@brightstar.co.nz, or Hailey Crow on or hcrow@brightstar.co.nz

4 Bright*Star s 15th Annual Information & IT Security 30 March 2010, Hyatt Regency, Protect your business against a growing number of increasingly complex cyber threats 9.00 Opening Remarks from the Chair Tony Krzyzewski, Director, KAON TECHNOLOGIES 9.05 Data at Risk Enterprise data is growing and managing that data growth has resulted in the implementation of an increasing number of databases and centralisation of most critical company information in large data warehouses. Thus, it is now possible for a single breach of data security to become a catastrophic event. In this session we will investigate control strategies to help mitigate the risk of an adverse data disclosure such as: Management of privileged users Effective logging Database QA and Change Management processes Eric Svetcov, Director, SV TECHNOLOGIES 9.50 CASE STUDY: The Warehouse s Journey to PCI Compliance Attaining PCI compliance is a difficult task; yet it s important to never lose sight of the fact that compliance is only a starting point it should never be the end goal. This session will describe the Warehouse s road to PCI compliance and challenges along the way. Richard A court, Infrastructure Architect, THE WAREHOUSE Morning Break & Refreshments Mobile Phone Insecurity There are 3.3 billion cell phone users in the world, yet mobile phone users generally do not consider that their phone may put them at risk and happily use them without considering the many inherent vulnerabilities. The range of mobile phone vulnerabilities, from interception, loss or theft, tracking, bugging, targeted data acquisition, and threats from the Internet How these vulnerabilities can be exploited How users may improve the safety of their mobile phone use Dr Hank Wolfe, Associate Professor, UNIVERSITY OF OTAGO Security Among the Clouds Cloud computing is rapidly moving from hype to a musthave service model. The benefits are certainly real, but a business must ensure that the cloud environment is secure enough for its essential data. Cloud computing has matured to the point that it can be a secure, viable and highly effective approach. But without careful planning and consideration, the gains can be overshadowed by the risk exposure. The realities and risks of the cloud How cloud service providers mitigate risk The right data and applications for the cloud Assessing your risks, and the cloud provider s capabilities Philip Whitmore, Director - Assurance, PRICEWATERHOUSECOOPERS Lunch Break 1.15 Outsourcing Information Security - The Oxymoron that Defined an Industry? Outsourcing information security has become a popular option for many businesses. Outsourcing is often seen as a more cost effective way of delivering security, but, it is not without security implications. This presentation examines some common methods of outsourcing information security, some common pitfalls and how these might be addressed. Simon Burson, Manager, DELOITTE 2.00 DEMONSTRATION: Client-Side Security: Where to From Here? So it s 2010, and you re thinking Im secure now! right? You have your firewall, AV, security policy, PCI, ISO, and you re armed to the teeth with security technology and staff. I m sorry, but the game has changed, and you are still insecure, and will likely get hacked in This presentation will take an in-depth look at client-side vulnerabilities and how they have become the focus of hackers across the globe. This session will demonstrate just how easy it is to compromise your desktop computer, while you simply browse a website. To make matters worse, it s not even that hard. Scott Bell, Security Consultant, SECURITY-ASSESSMENT.COM 2.45 CASE STUDY: Computer Security Meets Digital and Network Forensics: New Ideas in Forensically Sound Adaptive Security This session describes techniques which demonstrate how IT security and network forensics can work together. In particular, it addresses computer security and forensic analysis from a real-time perspective such that security events can be monitored in a live network while sound forensic data collection, storage and processing can be carried out in parallel. Interworking of network forensics with security architectures Real-time forensically sound adaptive security Monitoring, intrusion detection/prevention and reactive firewall architecture Real-time analysis of log files and incident response Ray Hunt, Associate Professor, UNIVERSITY OF CANTERBURY & Malcolm Shore, Head of Security, TELECOM NZ 3.30 Afternoon Break & Refreshments 3.45 CASE STUDY: Managing Social Networking Insecurities Socials Networks: love them or hate them, you cannot ignore them. Their exponential growth over the last few years has changed the landscape of personal information sharing and data privacy. This session will show some of the Social Networking security issues that you need to be concerned about, and policies and practices you can put in place to tackle them. Paul Blowers, Enterprise Security Architect, NZ POLICE and Andy Prow, Managing Director, AURA SOFTWARE SECURITY LTD 4.30 DEMONSTRATION: Web Application Insecurities and You This session will include a live demonstration of how web application vulnerabilities are discovered and exploited by attackers. New and old exploitation techniques of common security flaws will be demonstrated which will show that even seemingly minor issues, can have far greater consequences when used in conjunction with other issues. Throughout the demonstration, we will also highlight and discuss various recommendations and solutions to improve the security of web applications during all phases of application development. Brett Moore, Managing Director, INSOMNIA SECURITY 5.15 Summary Remarks from the Chair and Close of Conference followed by Networking Drinks

5 Bright*Star Conferences, in conjunction with the Chapter of ISACA, are proud to present: IT Governance, Audit & Information Security 29 March 2010, Hyatt Regency, Incorporating the ISACA Chapter Annual Conference The current financial environment that the world finds itself in means that it is more imperative than ever to ensure the maximum value is being derived from all elements of the business. Bright*Star, in conjunction with the Chapter of ISACA, have put together an intensive one day conference designed to ensure your IT shop is aligned with business objectives and organisational goals. You ll be able to customise your conference experience with streams on Audit, Governance and Security. And you ll be able to network with some of the best IT Assurance and Governance professionals and practitioners the country has to offer. With thought leading presentations and case studies from: Audit NZ Government Communications Security Bureau Ports of Ernst & Young Westpac Air New Zealand Office of the Privacy Commissioner and more! PLUS! Our International Keynote Address IT Audit and Governance in a Post-Recession World, presented by Mark Toomey, Managing Director, INFONOMICS Information & IT Security 30 March 2010, Hyatt Regency, Protect your business against a growing number of increasingly complex cyber threats IT security issues continue to cost businesses time, money and information. Time and again we see media reports of organisations leaving information on unencrypted USB drives, having little or no Identity and Access Management protocols, or losing payment card data to hackers. This intensive one day event is designed specifically to combat the ever increasing number and complexity of IT risks and threats. We will discuss critical elements such as: Mobile Security Threat Detection and Forensics PCI-DSS Compliance Security Outsourcing Database Security Make the investment into keeping yourself up to date with the latest security threats not to mention the networking opportunities with some of New Zealand s top IT Security minds! With a format that packs in all the need-to-know issues into one day, this is one IT security event not to be missed!

6 Priority Booking Code Customer Number 2 q FIVE EASY WAYS TO REGISTER: Online: Visit our Website By Send to register@brightstar.co.nz including all the information indicated on the registration form By Fax: Fax completed registration form to (09) By Phone: (09) By Post: Return completed registration form together with payment to Freepost P O Box WHEN & WHERE Conference Code: BC042/BC043 Brochure Code: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z FIRST DELEGATE Mr/Mrs/Ms/Dr First Name Surname Please register me for: IT Governance, Audit and Information Security SECOND DELEGATE Mr/Mrs/Ms/Dr First Name Surname Please register me for: IT Governance, Audit and Information Security 29 & 30 March 2010 Hyatt Regency Hotel HOW TO PAY Payment must be received before the conference to guarantee your place. Individual registrations are unable to be shared. Direct Credit payment to our bank account (please post advice of remittance) Bank: The National Bank, North Shore Corporate Account Name: Conferenz Ltd Account Number: Post a crossed cheque payable to Brightstar Conferences & Training Ltd THIRD DELEGATE Mr/Mrs/Ms/Dr First Name Please register me for: COMPANY DETAILS Company Name Postal Address Surname 10% discount IT Governance, Audit and Information Security Please invoice my organisation the sum of $ (GST No ) My purchase order number is (state if applicable) You can also pay by credit card. Call our Customer Service Team on (09) if you wish to pay by this method, or register online at Bright*Star Conferences & Training is a trading division of Conferenz Ltd Telephone Name of Approving Manager Booking Contact No. of employees on site Nature of Business Share a ticket and save up to $495 If you would like to attend one day and have a colleague from the same organisation attend the other, book together and save up to $495 on the individual prices Early-Bird Special Register and pay by 5pm 15 February 2010 Fax Standard Price One Event $1095+GST (Save $300) One Event $1395+GST Both Events $1995+GST (Save $300) Both Events $2295+GST Course Proceedings I can t attend but I don t want to miss out on this crucial information. I wish to purchase the course proceedings at $395 + GST for one day, and $495 for both days. Delegates will receive course documentation electronically. Register and pay after 5pm 15 February 2010 IT Governance, Audit and Information Security What happens if I have to cancel? You have several options: Send a substitute delegate in your place Confirm your cancellation in writing (letter, fax or ) at least ten working days prior to the event and receive a refund less a $300+GST service charge per registrant. Regrettably, no refunds can be made for cancellations received after this date, however, upon request you receive the electronic course documentation. Bright*Star reserves the right to make any necessary amendments to the agenda in the best interests of the conference. Delegates are responsible for their own travel/accommodation and no compensation will be made should the conference be rescheduled or cancelled. Team Discount 3rd delegate receives a 10% discount. 4th delegate & subsequent delegates receive a 15% discount. Team discounts can be applied to Early- Bird specials and standard prices only. Copyright 2009 Conferenz Ltd Incorrect Mailing If you are receiving multiple mailings or would like us to change any details or remove your name from our database, please contact our Database Department on (09) quoting your customer number. Your Privacy Personal data is gathered in accordance with the Privacy Act. Your details may be passed to other companies who wish to communicate with you offers related to your business activities. If you do not wish to receive these offers, please tick the following circle.

Halo. NZ s leading business conferences. Business Intelligence. From

Halo. NZ s leading business conferences. Business Intelligence. From From Supporting Organisations Silver Sponsors Halo Business Intelligence NZ s leading business conferences DAY 1 19th February 8.30 Registration and coffee 9.00 Opening remarks from the Chair David Bloch,

More information

ASSET MANAGEMENT TRAINING

ASSET MANAGEMENT TRAINING ASSET MANAGEMENT TRAINING 3rd and 4th August 2010, Duxton Hotel, Auckland Asset Economics, Lifecycle & Costing 18th & 19th August 2010, Mercure Hotel, Auckland 25th and 26th August 2010, Mercure Hotel,

More information

PROJECT MANAGEMENT. Project Management Essentials Techniques for achieving 80% results with 20% effort

PROJECT MANAGEMENT. Project Management Essentials Techniques for achieving 80% results with 20% effort PROJECT MANAGEMENT Techniques for achieving 80% results with 20% effort 14 & 15 October 1 & 2 November Maximising Productivity and Efficiency in a Multi-Project Environment 8 & 9 November 18 & 19 November

More information

Business Improvement in Universities

Business Improvement in Universities Business Improvement in Universities Transforming back-of-house functions to maximise efficiency gains 24th & 25th September, 2014, Rydges Melbourne Key Speakers Benefits of attending Peter Marshall Chief

More information

Business Continuity Management & Disaster Recovery

Business Continuity Management & Disaster Recovery Conference Business Continuity Business Resilience: Post Christchurch Discuss key lessons arising from the Canterbury Earthquakes, with case studies from: Christchurch Airport Beca New Zealand Post ASB

More information

New Skills. New Thinking

New Skills. New Thinking New Skills. New Thinking Team discounts and in-house options available PROFESSIONAL DEVELOPMENT FOR EAs, PAs AND OFFICE MANAGERS Essential Management Skills for Executive Assistants, Senior PAs & Administration

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

Business Opportunity Enablement through Information Security Compliance

Business Opportunity Enablement through Information Security Compliance Level 3, 66 King Street Sydney NSW 2000 Australia Telephone +61 2 9290 4444 or 1300 922 923 Business Opportunity Enablement through Information Security Compliance Page No.1 Business Opportunity Enablement

More information

CORPORATE FINANCE TRAINING SERIES. Ensuring effective due diligence in the New Zealand environment

CORPORATE FINANCE TRAINING SERIES. Ensuring effective due diligence in the New Zealand environment Train your team and gain huge savings - see back page for details CORPORATE FINANCE TRAINING SERIES Seminar 1: Ensuring effective due in the New Zealand environment 30 June & 1 July 2010, Mercure Hotel,

More information

Procurement & Supply Chain Management

Procurement & Supply Chain Management New Skills. New Thinking Procurement & Supply Chain Management Supply Chain Effectiveness Audit - Implementing lean processes in your supply chain 20 September 2012 Auckland 24 September 2012 Wellington

More information

Caretower s SIEM Managed Security Services

Caretower s SIEM Managed Security Services Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During

More information

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC Business Improvement in Universities Realigning services to drive efficiency 15th & 16th June 2016, CQ Functions Melbourne Key Speakers Benefits of attending Paul Duldig Head of University Services THE

More information

Managing Credit, Accounts Receivable and Debt Recovery - Essential tools for collection, process and prevention

Managing Credit, Accounts Receivable and Debt Recovery - Essential tools for collection, process and prevention Professional Development for the Accounts Team Managing Credit, Accounts Receivable and Debt Recovery - Essential tools for collection, process and prevention 6 & 7 September Mercure Hotel, 14 & 15 September

More information

Big 4 Information Security Forum

Big 4 Information Security Forum San Francisco ISACA Chapter Proudly Presents: Big 4 Information Security Forum A Day-Long, Multi-Session Event, being held in San Francisco @ the Sir Francis Drake Hotel! *** PLEASE NOTE THIS EVENT WILL

More information

Martin Keogh Acting Chief Operating Officer ALFRED HEALTH, VIC. Dr Ian Scott Director, Department of Internal Medicine & Clinical Epidemiology

Martin Keogh Acting Chief Operating Officer ALFRED HEALTH, VIC. Dr Ian Scott Director, Department of Internal Medicine & Clinical Epidemiology Driving whole of hospital reform to Improve Patient Flow 19th & 20th May, 2015, Oaks on Market Hotel, Melbourne Key Speakers Benefits of attending Colton Miller Nurse Manager, Emergency Department TAMPA

More information

A Guide to the Cyber Essentials Scheme

A Guide to the Cyber Essentials Scheme A Guide to the Cyber Essentials Scheme Published by: CREST Tel: 0845 686-5542 Email: admin@crest-approved.org Web: http://www.crest-approved.org/ Principal Author Jane Frankland, Managing Director, Jane

More information

AUSTRALIAN. Sponsorship and Trade Exhibition Opportunities

AUSTRALIAN. Sponsorship and Trade Exhibition Opportunities 13th Annual CEFPI Australasia Region Conference 29-31 May 2013 SKYCITY Hotel, Auckland New Zealand AUSTRALIAN Sponsorship and Trade Exhibition Opportunities CEFPI 2013 CONFERENCE 29-31 May 2013, SKYCITY

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

BUSINESS ANALYST EXAMINING BEHAVIOURS OF HIGH-PERFORMING BUSINESS ANALYSTS 4TH ANNUAL. Gain insight into leading NZ companies with presentations from:

BUSINESS ANALYST EXAMINING BEHAVIOURS OF HIGH-PERFORMING BUSINESS ANALYSTS 4TH ANNUAL. Gain insight into leading NZ companies with presentations from: 4TH ANNUAL EXAMINING BEHAVIOURS OF HIGH-PERFORMING S Gain insight into leading NZ companies with presentations from: Russell McVeagh Sealord Mainfreight Westpac Davanti Consulting ACC Vodafone Equinox

More information

Assessing the strength of your security operating model

Assessing the strength of your security operating model www.pwc.com Assessing the strength of your security operating model May 2014 Assessing the strength of your security operating model Retail stores, software companies, the U.S. Federal Reserve it seems

More information

Successfully Implementing and Using Mobility for Enterprise Asset Management

Successfully Implementing and Using Mobility for Enterprise Asset Management Register online at: www.tacook.com/mobile-emea November 28 29, 2012, Amsterdam, Netherlands Successfully Implementing and Using Mobility for Enterprise Asset Management Discover the Potential of Mobile

More information

Who s next after TalkTalk?

Who s next after TalkTalk? Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

Targeting the problem together

Targeting the problem together 18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part

More information

SALES NEGOTIATION FOR RESULTS

SALES NEGOTIATION FOR RESULTS EXPAND YOUR SALES EXPERTISE & SUCCESS WITH BRIGHT*STAR TRAINING THE SALES PROCESS 18-19 March 2013, Auckland 8-9 April 2013, Wellington 21-22 March 2013, Auckland 10-11 April 2013, Wellington 25-26 March

More information

Innovative Advertising

Innovative Advertising Innovative Advertising for Digital Broadcasting & Media AFRICA 2nd - 4th June 2015 Johannesburg, South Africa Supporting Partner: KEY THEMES AND ISSUES AROUND THIS TOPIC The changing dynamics of advertising

More information

Specialist Cloud Services. Acumin Cloud Security Resourcing

Specialist Cloud Services. Acumin Cloud Security Resourcing Specialist Cloud Services Acumin Cloud Security Resourcing DOCUMENT: FRAMEWORK: STATUS Cloud Security Resourcing Service Definition G-Cloud Released VERSION: 1.0 CLASSIFICATION: CloudStore Acumin Consulting

More information

PROFESSIONAL DEVELOPMENT FOR THE ACCOUNTS TEAM

PROFESSIONAL DEVELOPMENT FOR THE ACCOUNTS TEAM PROFESSIONAL DEVELOPMENT FOR THE ACCOUNTS TEAM Effectively Managing & Organising Accounts Payable: Improving efficiency, productivity and processes 26 & 27 October 2011 Wellington 9 & 10 November 2011

More information

Your all-new, must attend operations event for 2015

Your all-new, must attend operations event for 2015 15 & 16 September 2015, Crowne Plaza, Auckland People, process & planning Optimised for maximum performance New Zealand s first cross-industry event covering the full breadth of the multifaceted operations

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Main Themes. Speakers Include: include. Event Agenda - Day One

Main Themes. Speakers Include: include. Event Agenda - Day One Norton Park, Winchester 1st & 2nd December 2015 Speakers Include: include Simon Clements Director, Digital Business Programme Crown Prosecution Service John Holland Head of Data and Analytics Architecture-

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

Addressing Cyber Risk Building robust cyber governance

Addressing Cyber Risk Building robust cyber governance Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber

More information

MAXIMUM PROTECTION, MINIMUM DOWNTIME

MAXIMUM PROTECTION, MINIMUM DOWNTIME MANAGED SERVICES MAXIMUM PROTECTION, MINIMUM DOWNTIME Get peace of mind with proactive IT support Designed to protect your business, save you money and give you peace of mind, Talon Managed Services is

More information

Secure Web Applications. The front line defense

Secure Web Applications. The front line defense Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security

More information

INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT

INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 TH - 18 TH JUNE 2014 SWISSOTEL SYDNEY CBD PLATINUM SPONSOR GOLD SPONSOR SILVER SPONSOR BRONZE SPONSOR SUPPORTING ORGANISATION SUPPORTING ASSOCIATION ABOUT

More information

Vendor. Management. For sponsorship or to become our partner, contact: marketing@achromicpoint.com

Vendor. Management. For sponsorship or to become our partner, contact: marketing@achromicpoint.com Knowledge Partner Presents 27th May 2015 - Bengaluru 5th June 2015 - New Delhi 24th June 2015 - Mumbai Vendor Risk Management For sponsorship or to become our partner, contact: marketing@achromicpoint.com

More information

INCLUDES THE REQUIREMENTS OF THE NEW ISO 14001:2015 STANDARD

INCLUDES THE REQUIREMENTS OF THE NEW ISO 14001:2015 STANDARD INCLUDES THE REQUIREMENTS OF THE NEW ISO 14001:2015 STANDARD -Course Summary- The one day International Certifications Environmental Management Training course will introduce the attendees to organisational

More information

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue

Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?

More information

HAPPY AND RESILIENT WORKFORCE

HAPPY AND RESILIENT WORKFORCE 19 th April, Cliftons Centre, Adelaide A PRACTICAL AND PROACTIVE APPROACH TO ORGANISATIONAL CHANGE Effectively managing change and making it work for your organisation Who Should Attend: Senior Managers,

More information

Harness the power of data to drive marketing ROI

Harness the power of data to drive marketing ROI Harness the power of data to drive marketing ROI I need to get better results from my marketing......and improve my return on investment. Are you directing spend where it ll have the greatest effect? MAKING

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

EXHIBITION PROSPECTUS

EXHIBITION PROSPECTUS EXHIBITION PROSPECTUS 25 TH INTERNATIONAL APPLIED GEOCHEMISTRY SYMPOSIUM INCORPORATING THE 35 TH NEW ZEALAND GEOTHERMAL WORKSHOP ROTORUA, NEW ZEALAND 18 21 NOVEMBER 2013 www.gns.cri.nz/iags Lake Rotorua

More information

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for

More information

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects

Cloud Computing. Cloud Computing An insight in the Governance & Security aspects Cloud Computing An insight in the Governance & Security aspects AGENDA Introduction Security Governance Risks Compliance Recommendations References 1 Cloud Computing Peter Hinssen, The New Normal, 2010

More information

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?

WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview Data protection and compliance In the cloud and in your data center 1 November 2013 Agenda 1 Introduction 2 Data protection overview 3 Understanding the cloud 4 Where do I start? 5 Wrap-up Page 2 Data

More information

YOU RE INVITED... Shaun Lines Event Manager Ph: 06 878 3456 M: 021 751 932 E: shaun@grow.co.nz W: www.grow.co.nz

YOU RE INVITED... Shaun Lines Event Manager Ph: 06 878 3456 M: 021 751 932 E: shaun@grow.co.nz W: www.grow.co.nz YOU RE INVITED...... to partner with GROW to actively promote an inclusive society where we realise vocational aspirations of all New Zealanders especially those with significant barriers. The Real Value

More information

PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS

PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS PROJECT MANAGEMENT FOR EXECUTIVE ASSISTANTS AND PERSONAL ASSISTANTS 2 Separately Bookable Seminars, 1 Mega Professional Development Forum for EAs and Pas 25 th & 26 th August, Marque Hotel, Brisbane Including

More information

IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

IT AUDIT WHO WE ARE. Current Trends and Top Risks of 2015 10/9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski IT AUDIT Current Trends and Top Risks of 2015 2 02 Eric Vyverberg WHO WE ARE David Kupinski Randy Armknecht Associate Director Internal Audit Protiviti 317.510.4661 eric.vyverberg@protiviti.com Managing

More information

Supply Chain Excellence

Supply Chain Excellence Executive MasterClass For fee, dates & location details see page 8 The Overview Introduction How can industry leaders build an effective supply chain to reduce costs and enhance value? Effective Supply

More information

The Software Experts. Training Courses and Events

The Software Experts. Training Courses and Events The Software Experts Training Courses and Events one HELPING UK ORGANISATIONS Ensure IT Compliance Education, Training & Development Many companies in the UK are finding that without accurate information

More information

MANAGEMENT COURSE PRACTICE » 2016 PROGRAMME. One of the requirements of Queensland Law Society to obtain your Principal Practising Certificate.

MANAGEMENT COURSE PRACTICE » 2016 PROGRAMME. One of the requirements of Queensland Law Society to obtain your Principal Practising Certificate. fmrc.com.au 02 9262 3377 Excellent content. Very practical, useful and extremely relevant PRACTICE MANAGEMENT COURSE One of the requirements of Queensland Law Society to obtain your Principal Practising

More information

Cybersecurity The role of Internal Audit

Cybersecurity The role of Internal Audit Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government

More information

Committees Date: Subject: Public Report of: For Information Summary

Committees Date: Subject: Public Report of: For Information Summary Committees Audit & Risk Management Committee Finance Committee Subject: Cyber Security Risks Report of: Chamberlain Date: 17 September 2015 22 September 2015 Public For Information Summary Cyber security

More information

fs viewpoint www.pwc.com/fsi

fs viewpoint www.pwc.com/fsi fs viewpoint www.pwc.com/fsi June 2013 02 11 16 21 24 Point of view Competitive intelligence A framework for response How PwC can help Appendix It takes two to tango: Managing technology risk is now a

More information

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL:

Business Operations. Module Db. Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Module Db Technical Solution Capita s Combined Offer for Business & Enforcement Operations delivers many overarching benefits for TfL: Cost is reduced through greater economies of scale, removal of duplication

More information

SOCIAL MEDIA BRANDING SUMMIT 2015

SOCIAL MEDIA BRANDING SUMMIT 2015 SOCIAL MEDIA BRANDING SUMMIT 2015 28 th 29 th May Palazzo Hotel, Fourways Johannesburg, South Africa Social media strategy and activation It s all about keeping control of the branding message through

More information

Legislative Council Panel on Information Technology and Broadcasting. Information Security

Legislative Council Panel on Information Technology and Broadcasting. Information Security For Information on 8 July 2013 LC Paper No. CB(4)834/12-13(05) Legislative Council Panel on Information Technology and Broadcasting Information Security Purpose This paper updates Members on the latest

More information

Enterprise Business Service Management

Enterprise Business Service Management Technical white paper Enterprise Business Service Management Key steps and components of a successful solution Table of contents Executive Summary... 2 Setting the goal establishing an IT initiative...

More information

Effective Software Security Management

Effective Software Security Management Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta dharmeshmm@mastek.com / dharmeshmm@owasp.org Table of Contents Abstract... 1

More information

Why You Need to Test All Your Cloud, Mobile and Web Applications

Why You Need to Test All Your Cloud, Mobile and Web Applications Why You Need to Test All Your Cloud, Introduction In a recent survey of security executives, more than 70 percent of respondents acknowledged that they are performing vulnerability tests on fewer than

More information

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au Cyber threat intelligence and the lessons from law enforcement kpmg.com.au Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many organisations

More information

National Approach to Information Assurance 2014-2017

National Approach to Information Assurance 2014-2017 Document Name File Name National Approach to Information Assurance 2014-2017 National Approach to Information Assurance v1.doc Author David Critchley, Dave Jamieson Authorisation PIAB and IMBA Signed version

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

Social-Engineering. Hacking a mature security program. Strategic Penetration Testing

Social-Engineering. Hacking a mature security program. Strategic Penetration Testing Social-Engineering Hacking a mature security program Strategic Penetration Testing Dave Kennedy (ReL1K) http://www.secmaniac.com twitter: Dave_ReL1K A Mature Security Program. Companies have invested a

More information

LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference

LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference 18 March, 2015 Pullman, Auckland EY s ediscovery Services offer rapidly deployable litigation support and professional Gold sponsor Proudly

More information

8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT. 17 th - 18 th June 2014 Swissotel Sydney CBD

8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT. 17 th - 18 th June 2014 Swissotel Sydney CBD 8TH INFORMATION GOVERNANCE AND EDISCOVERY SUMMIT 17 th - 18 th June 2014 Swissotel Sydney CBD PLATINUM SPONSOR GOLD SPONSORS BRONZE SPONSOR ABOUT THE EVENT Lawyers are going to find them selves empowered

More information

A masterclass in professional trading

A masterclass in professional trading A masterclass in professional trading In partnership with TSquared Trading Evening taster session 1 May 2014 Day one 9 May 2014 Day two 2 June 2014 London The Course Overview How to develop a trading plan

More information

Project Management Essentials 30 & 31 October 2012 Auckland 1 & 2 November 2012 Wellington

Project Management Essentials 30 & 31 October 2012 Auckland 1 & 2 November 2012 Wellington New Skills. New Thinking PROJECT MANAGEMENT Project Management Essentials 30 & 31 October 2012 Auckland 1 & 2 November 2012 Wellington Agile Project Management 5 & 6 November 2012 Auckland 8 & 9 November

More information

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com

Maintaining PCI-DSS compliance. Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Maintaining PCI-DSS compliance Daniele Bertolotti daniele_bertolotti@symantec.com Antonio Ricci antonio_ricci@symantec.com Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance

More information

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards

Westpac Merchant. A guide to meeting the new Payment Card Industry Security Standards Westpac Merchant A guide to meeting the new Payment Card Industry Security Standards Contents Introduction 01 What is PCIDSS? 02 Why does it concern you? 02 What benefits will you receive from PCIDSS?

More information

Business Intelligence 22nd February 2012, Rendezvous Hotel, Auckland

Business Intelligence 22nd February 2012, Rendezvous Hotel, Auckland Enterprise Performance Management 21st February 2012, Rendezvous Hotel, Auckland 5th Annual Business Intelligence 22nd February 2012, Rendezvous Hotel, Auckland Summit Enterprise Performance Management

More information

Digital Forensics G-Cloud Service Definition

Digital Forensics G-Cloud Service Definition Digital Forensics G-Cloud Service Definition 2013 General Dynamics Information Technology Limited. All rights 1 GDIT Team Clients Metropolitan Police Service The General Dynamics Information Technology

More information

A HELPING HAND TO PROTECT YOUR REPUTATION

A HELPING HAND TO PROTECT YOUR REPUTATION OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au

More information

Aberdeen City Council IT Security (Network and perimeter)

Aberdeen City Council IT Security (Network and perimeter) Aberdeen City Council IT Security (Network and perimeter) Internal Audit Report 2014/2015 for Aberdeen City Council August 2014 Internal Audit KPIs Target Dates Actual Dates Red/Amber/Green Commentary

More information

SYMPOSIUM PROGRAM DAY ONE

SYMPOSIUM PROGRAM DAY ONE Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief

More information

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not

More information

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25

More information

Achieving PCI DSS Compliance Through Outsourcing: Where to begin?

Achieving PCI DSS Compliance Through Outsourcing: Where to begin? Achieving PCI DSS Compliance Through Outsourcing: Where to begin? August 2014 Can you achieve PCI DSS compliance through outsourcing, and if so, how should you approach it? This whitepaper provides a brief

More information

IHLM Certificate In Healthcare Operations Management

IHLM Certificate In Healthcare Operations Management Brand New Course IHLM Certificate In Healthcare Transforming Healthcare Systems, Processes Projects During This Course You Will: Discover the principles and techniques through which operations management

More information

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

TRAINING COURSE: COMPLIANCE MANAGEMENT & PRACTICE

TRAINING COURSE: COMPLIANCE MANAGEMENT & PRACTICE TRAINING COURSE: COMPLIANCE MANAGEMENT & PRACTICE 2nd December 2015 At DENTONS One Fleet Place, London, EC4M 7WS (Nearest Stations: City Thameslink, St. Pauls) FOCUSSING ON EFFECTIVE & EFFICIENT COMPLIANCE

More information

Security Risk Solutions Limited is a privately owned Kenyan company that was established in 2007.

Security Risk Solutions Limited is a privately owned Kenyan company that was established in 2007. Information Security Management Present and Future By: Jona Owitti, CISA Director, Security Risk Solutions Limited Immediate Past Chairman, ISACA Kenya Chapter About SRS www.securityrisksolutions.net -

More information

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Top Five Ways to Protect Your Network. A MainNerve Whitepaper A MainNerve Whitepaper Overview The data security challenges within the business world have never been as challenging as they are today. Not only must organizations providers comply with stringent State

More information

DISCOVERY IN-HOUSE. Institute of Information Management 23 rd November 2010, Sydney. Graham Costello EMC

DISCOVERY IN-HOUSE. Institute of Information Management 23 rd November 2010, Sydney. Graham Costello EMC BRINGING G ELECTRONIC C DISCOVERY IN-HOUSE Institute of Information Management 23 rd November 2010, Sydney Graham Costello EMC 1 Agenda for discussion: Improving electronic discovery and regulatory compliance

More information

Fraud, Corruption and Money Laundering: Prevention, Detection and Recovery

Fraud, Corruption and Money Laundering: Prevention, Detection and Recovery IN HOUSE Fraud, Corruption and Money Laundering: Prevention, Detection and Recovery An intensive 4-day programme covering the latest anti-fraud, anticorruption and anti-money laundering techniques including:

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

How a Cloud Service Provider Can Offer Adequate Security to its Customers

How a Cloud Service Provider Can Offer Adequate Security to its Customers royal holloway s, How a Cloud Service Provider Can Offer Adequate Security to its Customers What security assurances can cloud service providers give their customers? This article examines whether current

More information

Incident Response Plan for PCI-DSS Compliance

Incident Response Plan for PCI-DSS Compliance Incident Response Plan for PCI-DSS Compliance City of Monroe, Georgia Information Technology Division Finance Department I. Policy The City of Monroe Information Technology Administrator is responsible

More information

12/11/2012. North America. New York. Risk management and strategy in a low rates environment. insurancerisknorthamerica.com

12/11/2012. North America. New York. Risk management and strategy in a low rates environment. insurancerisknorthamerica.com Regulatory update Economic capital Risk appetite ALM optimization Risk management and strategy in a low rates environment insurancerisknorthamerica.com Inaugural Insurance Risk North America conference

More information

PCI DSS Investing wisely...

PCI DSS Investing wisely... PCI DSS Investing wisely... Hotel webinar Neira Jones Head of Payment Security Barclaycard Global Payment Acceptance 25 th July 2011 Leading the way in secure payments global payment acceptance Hotel Security

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

Application Security in the Software Development Lifecycle

Application Security in the Software Development Lifecycle Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO

More information

FINANCIAL CRIME COMPLIANCE PROFESSIONALS CERTIFICATION PROGRAMME

FINANCIAL CRIME COMPLIANCE PROFESSIONALS CERTIFICATION PROGRAMME FINANCIAL CRIME COMPLIANCE PROFESSIONALS CERTIFICATION PROGRAMME 17 th June 2015 At DENTONS One Fleet Place, London, EC4M 7WS (Nearest Stations: City Thameslink or St. Pauls) DEVELOPING PRACTICAL SKILLS

More information

IT Transformation Summit 2013 - agenda Unleashing IT s competitive business potential

IT Transformation Summit 2013 - agenda Unleashing IT s competitive business potential IT Transformation Summit 2013 - agenda Unleashing IT s competitive business potential Tuesday November 26 th 2013 - British Museum, London 8.30 Registration and exhibition opens 9.30-9.40 Host s opening

More information

PCI Compliance: How to ensure customer cardholder data is handled with care

PCI Compliance: How to ensure customer cardholder data is handled with care PCI Compliance: How to ensure customer cardholder data is handled with care Choosing a safe payment process for your business Contents Contents 2 Executive Summary 3 PCI compliance and accreditation 4

More information