Cyber Security Information Sharing: A Case Study of Olympic Proportions
|
|
|
- Marilynn Sims
- 10 years ago
- Views:
Transcription
1 Cyber Security Information Sharing: A Case Study of Olympic Proportions Lynne Genik, Scientist, DRDC CSS Luc Beaudoin, Chief of Cyber Operations, CCIRC Presentation for CRHNet Symposium October 24, 2012
2 V2010 DRDC CSS Major Events Coordinated Security Solutions (MECSS) Project Privy Council Office Public Safety Canada SA Federal RCMP Major Events SA Partners RCMP Integrated Security Unit SA MECSS Regional British Columbia Integrated Public Safety SA Joint Task Force Games (CF) SA G8/G20 ISU SA SA: Scientific Advisor S&T: Science and Technology 1 S&T Clusters National Science and Technology Community Centres of Federal Labs Excellence Academia S&T Resources InternationalIndustry S&T
3 Vancouver 2010 (V2010) Winter Olympics Focused the world spotlight on Canada 10,000 accredited, 4000 unaccredited media Cooordination and cooperation of many organizations All levels of government and private sector V2010 Exercise Gold: 140 agencies, 45 coordination centres, 2000 participants Budgets in the billions Security: V2010 $1B, G8/G20 $1B Broadcasting rights: NBC US$2.2B for 2010/2012 Olympics Infrastructure costs: V2010 Canada Line $2B, Seato-Sky Highway expansion $1B 2
4 Why is Cyber Security Important? Relied on by all sectors for operations Significant cyber security incident would reflect badly on Canada Major events information space: Cyber Security Schedule of Events Results + Key Messages Media broadcasting 3
5 Major Events Cyber Threats Direct and indirect (e.g. power outages) denial of service on critical IT services; Hacktivism (criminal, copyright infringement, intellectual property, brand, etc.); Malware distribution scheme leveraging the event Phishing s to organizers and participants Broad distribution (e.g. social media, video, search engine optimization (SEO) poisoning, etc.) Cyber incident affecting a guest/diplomat/vip involving Canadian IT assets 4
6 V2010 Cyber Security Preparations V2010 Cyber Security Working Group V2010 Integrated Exercises Series Integrated Threat Assessment Centre (ITAC) Joint Intelligence Group ISU Critical Infrastructure Unit (physical security) Individual organizations 5
7 V2010 Cyber Issues Issues identified in lead up to Games: Gaps in cyber threat situational awareness Planning occurring in silos Lack of coordinated response capability across agencies 6
8 V2010 MECSS Cyber Security Project Getting started Generally, those familiar with cyber operations saw value Resistance from some key offices/people Support of several influential people was critical Not a lot of time Goals Identify/close gaps ( low hanging fruit ) Establish cyber response capability across key stakeholders 7
9 V2010 MECSS Cyber Security Project 8 Approach Gathered small team of experts from different departments Identified key cyber stakeholders Performed cyber security review Short list of questions Face-to-face meetings Outputs Summary and recommendations provided to: Integrated Security Unit Canadian Cyber Incident Response Centre Chart of key cyber stakeholders distributed amongst stakeholders
10 Observations Organisations priorities varied by mandate and structure Lack of actionable cyber intelligence information No one organisation aware of all IT assets Density of assets very high Shared critical assets, sometimes without awareness Some assets holistically critical No system, authority, or forum for de-conflicting potential issues 9
11 10
12 Key Cyber Stakeholders Event Office of Prime Interest Main web portal Shared services (schedule, media, connectivity, etc.) Support Organisations Cellular and fibre service providers Weather systems Air traffic systems and other transport services Hotel/venue data services First Responders VHF/UHF radios Dispatch system Emergency phone (911) Physical Security Police and military information networks Area monitoring (camera network) Access control systems Satellite, unmanned aerial vehicles 11
13 12
14 Lessons Learned during V2010 Review Establishing trust and credibility critical Access to right subject matter experts (SMEs) key Not all levels of government have computer emergency response team capability Stakeholder buy-in varied Value of cyber information sharing not recognized from onset Threat and risk assessments not formally completed by many key organisations Cyber security knowledge in tacit form with SMEs Audit checklist too formal and overwhelming 13
15 Operational Challenges Distributed Ownership No clear national owner of the cyber security puzzle - everyone has a piece Liability Damages can be embarrassing and affect others (data exfiltration, infrastructure leveraged for sending spam and attacks, web defacement, etc.) Expertise Terminology and complexity requires direct interactions between cyber professionals for diagnosing incident root cause and mitigation strategy 14
16 Canadian Cyber Incident Response Centre 15 coordinating the national response
17 CCIRC s Mandate during V2010* Assist government departments, critical infrastructure owners and international partners with cyber security issues Coordination point for Government of Canada (GC) cyber response Receive significant incidents reports from federal departments Engage Cyber Triage Unit Provide cyber inputs into the Government Operations Centre (GOC) for situational awareness and risk assessment International point of contact for Canada for cyber security events 16 * Federal cyber security issues are now coordinated by the Communications Security Establishment (CSEC) while CCIRC focuses outside the federal government, coordinating the national response to cyber events affecting provinces, territories, municipalities, and CI owners/operators
18 Lessons Learned Regarding Operations Establishing trust and credibility critical Face-to-face Dedicated support staff Enable reporting Regular teleconferences Simple incident exchange mechanism Incident report template Provide secure communication channels (e.g. PKI, PGP) 17
19 Games Cyber Security Events Vaucouver2010.com Copy of Vancouver2010.com Hosted in Ukraine Video codec Search engine optimization (SEO) poisoning of Google index Olympic hats and mittens 2014 Winter Olympics David Atkins artist Luge Accident video Olympics Apollo Ono Speed Skater Closing Ceremony Olympics 2010 Closing Ceremony Olympics Tickets Olympian Tweeting Nodar Kumaritashvili Death US short track speed skating K.D. Lang Olympics Olympic Parade of Nations 18
20 19 Vancouver2010.com
21 20 Vaucouver2010.com
22 CCIRC Awareness Bulletin 21
23 Final Thoughts Cyber security does not fit well in existing emergency management frameworks Distributed ownership No geographical boundaries Time scale DRDC was well-positioned to undertake this work Expertise Trust (e.g. security clearances) Impartial Identifying key stakeholders, building trust amongst them, and providing an information sharing forum was an efficient and effective way to mitigate cyber risks 22
24 Paper Review and Coordination of Cyber Security for Vancouver 2010, Luc Beaudoin and Lynne Genik Available from /papers/10-04-Genik-Beaudoin-Cyber.pdf 23
25 24 Questions?
26 25
UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)
Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Cyber in the News 1 Tactics, Techniques and Procedures These observed tactics, techniques
Protecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy
Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy Presentation to The Institute of Internal Auditors Breakfast Session February 6, 2014 Outline of
Government of Canada Cyber Security Event Management Plan (formerly GC IT Incident Management Plan)
Government of Canada Cyber Security Event Management Plan (formerly GC IT Incident Management Plan) Presentation to PSCIOC March 5 th, 2015 Overview Drivers Current Landscape Proposed Changes Expected
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
Action Plan 2010-2015 for Canada s Cyber Security Strategy
Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated
ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency
ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
LONDON 2012: CYBER SECURITY
LONDON 2012: CYBER SECURITY SHARING OUR EXPERIENCES Oliver Hoare Former Head of Cyber Security Government Olympic Executive UNCLASSIFIED 1 GREAT BRITAIN CONGRATULATES TOKYO 2020 UNCLASSIFIED THEMES Scale
Internet Reputation Management Guide. Building a Roadmap for Continued Success
Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company
Information Security Seminar 2013
Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative
NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security
1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security [email protected] 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West
Internet Reputation Management Guidelines Building a Roadmap for Continued Success
Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.
How To Understand Cyber Security
Law Enforcement Perceptions of Cyber Security International Association of Chiefs of Police Canadian Association of Chiefs of Police May 2013 This study made possible through financial and program support
PUBLIC SAFETY. Industry Solutions Harness the Power of GIS for Public Safety
PUBLIC SAFETY Industry Solutions Harness the Power of GIS for Public Safety Esri has thousands of customers worldwide who are using the transforming power of GIS technology to respond to disasters and
Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration
Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration Security Network East Washington, D.C. May 2012 Anthony Ashley, PhD Director General Defence R&D Canada Centre
Federal Emergency Preparedness and Response System
Annex L Federal Emergency Preparedness and Response System Date of Latest Version: October 2006 Summary of Significant Changes: Reflects the establishment of the new department Public Safety and Emergency
Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
Cyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software
Incident Response Six Best Practices for Managing Cyber Breaches Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software www.encase.com 2014 Guidance Software Inc., All Rights
PORT ASSESSMENT. Name of Port : Date : Reference: Questions GENERAL INFORMATION - ASSESSORS
Name of Port : Date : Reference: Questions GENERAL INFORMATION - ASSESSORS PORT ASSESSMENT Details Notes 1 Date of assessment/survey 2 Name(s) of person(s) carrying out assessment 3 Relevant skills & expertise
EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS
EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS Ian Green Manager, Cybercrime & Intelligence Commonwealth Bank of Australia Session ID: GRC T17 Session Classification: ADVANCED WHY? What keeps you
EMERGENCY MANAGEMENT BRITISH COLUMBIA A STRATEGY TO ADVANCE SUPPORT FOR LOCAL AUTHORITY EMERGENCY MANAGEMENT PROGRAMS OCTOBER 14, 2015
EMERGENCY MANAGEMENT BRITISH COLUMBIA A STRATEGY TO ADVANCE SUPPORT FOR LOCAL AUTHORITY EMERGENCY MANAGEMENT PROGRAMS OCTOBER 14, 2015 1 MESSAGE FROM THE ASSISTANT DEPUTY MINISTER I am pleased to introduce
How To Protect The Internet From Natural Disasters
Network Security Policy: The U.S. Experience Patricia Cooper International Bureau U.S. Federal Communications Commission Network Security: The U.S. Experience Network Security: How we define it U.S. Approach:
Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM
IIA South Event 16 th June 2015 Cyber, Social Media and IT Risks 1 st and 2 nd Line Perspective David Canham (BA) Hons, MIRM Agenda This evening we ll cover the following: Who, why and what? Traditional
Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.
Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Assuring Telecom (Infrastructure and Services) An Operations Perspective
Industry Canada Assuring Telecom (Infrastructure and Services) An Operations Perspective IC Security Roles and Activities Assure Telecom Infrastructure and Services Enhance Telecom Security Expertise and
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Regional Transportation Management Centre
British Columbia Ministry of Transportation & Infrastructure Regional Transportation Management Centre Date: May, 2013 ITS Canada Conference Agenda Ministry Overview Existing ITS Initiatives Regional Transportation
BIG DATA AND CYBERSECURITY:
BIG DATA AND CYBERSECURITY: Multi Stakeholder Threats and Opportunities A US Speakers Program Embassy of the United States, Serbia September 20-25, 2015 Anne C. Bader Founder The International Cybersecurity
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Promoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
CAPITAL REGION GIS SPATIAL DATA DEMONSTRATION PROJECT
CAPITAL REGION GIS SPATIAL DATA DEMONSTRATION PROJECT DRAFT January 2013 Prepared by: O2 Planning + Design, Inc. The information contained in this document has been compiled by O2 Planning + Design Inc.
Performing Advanced Incident Response Interactive Exercise
Performing Advanced Incident Response Interactive Exercise Post-Conference Summary Merlin Namuth Robert Huber SCENARIO 1 - PHISHING EMAILS... 3... 3 Mitigations... 3 SCENARIO 2 - IDS ALERT FOR PSEXEC...
Protecting betting integrity
Protecting betting integrity October 2013 1 Introduction 1.1 The UK Gambling Commission (the Commission) was set up under the Gambling Act 2005 to regulate commercial gambling in Great Britain. We are
Contact Reporting Guidelines The Australian Government Contact Reporting Scheme
Contact Reporting Guidelines The Australian Government Contact Reporting Scheme Version 1.0 Approved September 2010 Contents Introduction... 1 The role of ASIO... 1 Australian Government Contact Reporting
Cyber Crime ACC Crime
AGENDA ITEM 10 STRATEGIC POLICING AND CRIME BOARD 3 rd December 2013 Cyber Crime ACC Crime PURPOSE OF REPORT 1. The purpose of this report is to provide members of the Strategic Police and Crime Board
Information security due diligence
web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 [email protected] www.watsonhall.com Identifying information security risk for web applications
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
ongo Job Title: Digital Marketing Officer Department: PR & Marketing Team: Digital Services Team Grade: 7
ongo Job Title: Digital Marketing Officer Department: PR & Marketing Team: Digital Services Team Grade: 7 Overall Purpose of Job Your job is to be the digital expert within our PR & Marketing team, driving
Strategic Plan: Relentless Pursuit of Excellence Speed Skating in Canada 2012-2020 (DRAFT)
Strategic Plan: Relentless Pursuit of Excellence Speed Skating in Canada 2012-2020 (DRAFT) 90 Relentless Pursuit of Excellence Speed Skating in Canada 2012-2020 TABLE OF CONTENTS Page Introduction......
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
INFRAGARD.ORG. Portland FBI. Unclassified 1
INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence
ISO27032 Guidelines for Cyber Security
ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance
Incident Response 101: You ve been hacked, now what?
Incident Response 101: You ve been hacked, now what? Gary Perkins, MBA, CISSP Chief Information Security Officer (CISO) Information Security Branch Government of British Columbia Agenda: threat landscape
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
FBI CHALLENGES IN A CYBER-BASED WORLD
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative
Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following
CGI Cyber Risk Advisory and Management Services for Insurers
CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their
Cyber Security Incident Reporting Scheme
OCIO/G4.12a ISMF Guideline 12a Cyber Security Incident Reporting Scheme BACKGROUND Reporting cyber security incidents is a source of intelligence information that assists in the development of a greater
Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014
Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014 Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988:
Cyber security trends & strategy for business (digital?)
Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
integrating cutting-edge security technologies the case for SIEM & PAM
integrating cutting-edge security technologies the case for SIEM & PAM Introduction A changing threat landscape The majority of organizations have basic security practices in place, such as firewalls,
Internet Security and Resiliency: A Collaborative Effort
Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing
Security Risk Assessment Tool
Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME
STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic
CYBER SECURITY TRAINING SAFE AND SECURE
CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need
Technology and Cyber Resilience Benchmarking Report 2012. December 2013
Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities
Ministry of Small Business,Technology and Economic Development
Ministry of Small Business,Technology and Economic Development 2 BRITISH COLUMBIA S TRADE AND INVESTMENT STRATEGY FOR CHINA Why China is Important to British Columbia China is the world s fourth largest
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities
16 Oct 2012 Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities Bradford Willke Cyber Security Advisor, Mid Atlantic Region National Cyber Security Division (NCSD) Office
DRAFT Report on Office of the Superintendent of Financial Report on Institutions Office of the Superintendent of Financial
DRAFT Report on Office of the Superintendent of Financial Report on Institutions Office of the Superintendent of Financial Institutions Regulation Sector Approvals & Precedents Group Office of the Chief
Application Guidance CCP Penetration Tester Role, Practitioner Level
August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document
Canada 2017! A Digital Nation Focus on ICT
Canada 2017! A Digital Nation Focus on ICT Growing Canada s Prosperity Used for Ministerial Briefing www.itac.ca Page 1 Introduction ICT & Canada s prosperity Importance of ICT to Canada s prosperity:
Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies
Aon Risk Solutions Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies A terrorist incident at or near your operations, could result in human casualties, property damage, business
Business Risk Management - Top 10 Questions to Ask
How to Ace IT Governance Without Tech Expertise 50 POWERFUL QUESTIONS READY TO ASK AT YOUR NEXT BOARD MEETING Corporate Director and Creator of THE BOARDROOM BLUEPRINT TM OVERVIEW 50 POWERFUL I.T. QUESTIONS
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For
Working Towards the 2020 Tokyo Olympics
Working Towards the 2020 Tokyo Olympics - The Current Situation in 2015 Mariko Miya Cyber Defense Institute, Inc. [email protected] Agenda 1. Introduction 2. The current situation in Japan 2015 Analytics
Connect Smart for Business SME TOOLKIT
Protect yourself online Connect Smart for Business SME TOOLKIT WELCOME To the Connect Smart for Business: SME Toolkit The innovation of small and medium sized enterprises (SMEs) is a major factor in New
Major Incident Procedures. What businesses and the voluntary sector need to know
Major Incident Procedures What businesses and the voluntary sector need to know Introduction This guide is designed to increase the understanding of the roles and responsibilities of the emergency services
G7 Opportunities for Collaboration
ANNEX G7 Opportunities for Collaboration To strengthen international cooperation and collaboration and to achieve the actions in the G7 ICT Ministers Joint Declaration, G7 members seek to share information
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
EMERGENCY COMMUNICATIONS SERVICE DELIVERY IN BRITISH COLUMBIA
EMERGENCY COMMUNICATIONS SERVICE DELIVERY IN BRITISH COLUMBIA Police Communication Centres and 911 Public Safety Answering Points STRATEGIC VISION SUMMARY OF CONSULTATION COMMENTS JULY 2015 Copyright 2015,
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.
Security systems URBAN SECURITY Information systems protecting major cities with a main goal: to guarantee citizen s well being indracompany.com isafety Urban Security Supports and strengthens coordination
BT Assure Rethink the Risk
BT Assure Rethink the Risk Analyst and Consultant Update May 2012 BT Assure. Security that matters Today's agenda Introductions Neil Sutton Vice President, Global Portfolio 3 Minutes BT Assure Overview
