Cyber Security Information Sharing: A Case Study of Olympic Proportions

Size: px
Start display at page:

Download "Cyber Security Information Sharing: A Case Study of Olympic Proportions"

Transcription

1 Cyber Security Information Sharing: A Case Study of Olympic Proportions Lynne Genik, Scientist, DRDC CSS Luc Beaudoin, Chief of Cyber Operations, CCIRC Presentation for CRHNet Symposium October 24, 2012

2 V2010 DRDC CSS Major Events Coordinated Security Solutions (MECSS) Project Privy Council Office Public Safety Canada SA Federal RCMP Major Events SA Partners RCMP Integrated Security Unit SA MECSS Regional British Columbia Integrated Public Safety SA Joint Task Force Games (CF) SA G8/G20 ISU SA SA: Scientific Advisor S&T: Science and Technology 1 S&T Clusters National Science and Technology Community Centres of Federal Labs Excellence Academia S&T Resources InternationalIndustry S&T

3 Vancouver 2010 (V2010) Winter Olympics Focused the world spotlight on Canada 10,000 accredited, 4000 unaccredited media Cooordination and cooperation of many organizations All levels of government and private sector V2010 Exercise Gold: 140 agencies, 45 coordination centres, 2000 participants Budgets in the billions Security: V2010 $1B, G8/G20 $1B Broadcasting rights: NBC US$2.2B for 2010/2012 Olympics Infrastructure costs: V2010 Canada Line $2B, Seato-Sky Highway expansion $1B 2

4 Why is Cyber Security Important? Relied on by all sectors for operations Significant cyber security incident would reflect badly on Canada Major events information space: Cyber Security Schedule of Events Results + Key Messages Media broadcasting 3

5 Major Events Cyber Threats Direct and indirect (e.g. power outages) denial of service on critical IT services; Hacktivism (criminal, copyright infringement, intellectual property, brand, etc.); Malware distribution scheme leveraging the event Phishing s to organizers and participants Broad distribution (e.g. social media, video, search engine optimization (SEO) poisoning, etc.) Cyber incident affecting a guest/diplomat/vip involving Canadian IT assets 4

6 V2010 Cyber Security Preparations V2010 Cyber Security Working Group V2010 Integrated Exercises Series Integrated Threat Assessment Centre (ITAC) Joint Intelligence Group ISU Critical Infrastructure Unit (physical security) Individual organizations 5

7 V2010 Cyber Issues Issues identified in lead up to Games: Gaps in cyber threat situational awareness Planning occurring in silos Lack of coordinated response capability across agencies 6

8 V2010 MECSS Cyber Security Project Getting started Generally, those familiar with cyber operations saw value Resistance from some key offices/people Support of several influential people was critical Not a lot of time Goals Identify/close gaps ( low hanging fruit ) Establish cyber response capability across key stakeholders 7

9 V2010 MECSS Cyber Security Project 8 Approach Gathered small team of experts from different departments Identified key cyber stakeholders Performed cyber security review Short list of questions Face-to-face meetings Outputs Summary and recommendations provided to: Integrated Security Unit Canadian Cyber Incident Response Centre Chart of key cyber stakeholders distributed amongst stakeholders

10 Observations Organisations priorities varied by mandate and structure Lack of actionable cyber intelligence information No one organisation aware of all IT assets Density of assets very high Shared critical assets, sometimes without awareness Some assets holistically critical No system, authority, or forum for de-conflicting potential issues 9

11 10

12 Key Cyber Stakeholders Event Office of Prime Interest Main web portal Shared services (schedule, media, connectivity, etc.) Support Organisations Cellular and fibre service providers Weather systems Air traffic systems and other transport services Hotel/venue data services First Responders VHF/UHF radios Dispatch system Emergency phone (911) Physical Security Police and military information networks Area monitoring (camera network) Access control systems Satellite, unmanned aerial vehicles 11

13 12

14 Lessons Learned during V2010 Review Establishing trust and credibility critical Access to right subject matter experts (SMEs) key Not all levels of government have computer emergency response team capability Stakeholder buy-in varied Value of cyber information sharing not recognized from onset Threat and risk assessments not formally completed by many key organisations Cyber security knowledge in tacit form with SMEs Audit checklist too formal and overwhelming 13

15 Operational Challenges Distributed Ownership No clear national owner of the cyber security puzzle - everyone has a piece Liability Damages can be embarrassing and affect others (data exfiltration, infrastructure leveraged for sending spam and attacks, web defacement, etc.) Expertise Terminology and complexity requires direct interactions between cyber professionals for diagnosing incident root cause and mitigation strategy 14

16 Canadian Cyber Incident Response Centre 15 coordinating the national response

17 CCIRC s Mandate during V2010* Assist government departments, critical infrastructure owners and international partners with cyber security issues Coordination point for Government of Canada (GC) cyber response Receive significant incidents reports from federal departments Engage Cyber Triage Unit Provide cyber inputs into the Government Operations Centre (GOC) for situational awareness and risk assessment International point of contact for Canada for cyber security events 16 * Federal cyber security issues are now coordinated by the Communications Security Establishment (CSEC) while CCIRC focuses outside the federal government, coordinating the national response to cyber events affecting provinces, territories, municipalities, and CI owners/operators

18 Lessons Learned Regarding Operations Establishing trust and credibility critical Face-to-face Dedicated support staff Enable reporting Regular teleconferences Simple incident exchange mechanism Incident report template Provide secure communication channels (e.g. PKI, PGP) 17

19 Games Cyber Security Events Vaucouver2010.com Copy of Vancouver2010.com Hosted in Ukraine Video codec Search engine optimization (SEO) poisoning of Google index Olympic hats and mittens 2014 Winter Olympics David Atkins artist Luge Accident video Olympics Apollo Ono Speed Skater Closing Ceremony Olympics 2010 Closing Ceremony Olympics Tickets Olympian Tweeting Nodar Kumaritashvili Death US short track speed skating K.D. Lang Olympics Olympic Parade of Nations 18

20 19 Vancouver2010.com

21 20 Vaucouver2010.com

22 CCIRC Awareness Bulletin 21

23 Final Thoughts Cyber security does not fit well in existing emergency management frameworks Distributed ownership No geographical boundaries Time scale DRDC was well-positioned to undertake this work Expertise Trust (e.g. security clearances) Impartial Identifying key stakeholders, building trust amongst them, and providing an information sharing forum was an efficient and effective way to mitigate cyber risks 22

24 Paper Review and Coordination of Cyber Security for Vancouver 2010, Luc Beaudoin and Lynne Genik Available from /papers/10-04-Genik-Beaudoin-Cyber.pdf 23

25 24 Questions?

26 25

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Cyber in the News 1 Tactics, Techniques and Procedures These observed tactics, techniques

More information

Protecting critical infrastructure from Cyber-attack

Protecting critical infrastructure from Cyber-attack Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale

More information

Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy

Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy Presentation to The Institute of Internal Auditors Breakfast Session February 6, 2014 Outline of

More information

Government of Canada Cyber Security Event Management Plan (formerly GC IT Incident Management Plan)

Government of Canada Cyber Security Event Management Plan (formerly GC IT Incident Management Plan) Government of Canada Cyber Security Event Management Plan (formerly GC IT Incident Management Plan) Presentation to PSCIOC March 5 th, 2015 Overview Drivers Current Landscape Proposed Changes Expected

More information

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information

More information

Action Plan 2010-2015 for Canada s Cyber Security Strategy

Action Plan 2010-2015 for Canada s Cyber Security Strategy Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated

More information

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2 ENISA The

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015 Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders

More information

LONDON 2012: CYBER SECURITY

LONDON 2012: CYBER SECURITY LONDON 2012: CYBER SECURITY SHARING OUR EXPERIENCES Oliver Hoare Former Head of Cyber Security Government Olympic Executive UNCLASSIFIED 1 GREAT BRITAIN CONGRATULATES TOKYO 2020 UNCLASSIFIED THEMES Scale

More information

Internet Reputation Management Guide. Building a Roadmap for Continued Success

Internet Reputation Management Guide. Building a Roadmap for Continued Success Internet Reputation Management Guide Building a Roadmap for Continued Success About BrandProtect BrandProtect is the leader in multi-channel Internet threat monitoring and risk mitigation. The company

More information

Information Security Seminar 2013

Information Security Seminar 2013 Information Security Seminar 2013 Mr. Victor Lam, JP Deputy Government Chief Information Officer Office of the Government Chief Information Officer The Government of the Hong Kong Special Administrative

More information

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security

NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations. Ian J West Chief, Cyber Security 1 NATO Cyber Security Capabilities & Industry Opportunities Building on Solid Foundations Ian J West Chief, Cyber Security [email protected] 2 NATO UNCLASSIFIED Cyber Security Service Line Ian West

More information

Internet Reputation Management Guidelines Building a Roadmap for Continued Success

Internet Reputation Management Guidelines Building a Roadmap for Continued Success Internet Reputation Management Guidelines Building a Roadmap for Continued Success Table of Contents Page INTERNET REPUTATION MANAGEMENT GUIDELINES 1. Background 3 2. Reputation Management Roadmap 5 3.

More information

How To Understand Cyber Security

How To Understand Cyber Security Law Enforcement Perceptions of Cyber Security International Association of Chiefs of Police Canadian Association of Chiefs of Police May 2013 This study made possible through financial and program support

More information

PUBLIC SAFETY. Industry Solutions Harness the Power of GIS for Public Safety

PUBLIC SAFETY. Industry Solutions Harness the Power of GIS for Public Safety PUBLIC SAFETY Industry Solutions Harness the Power of GIS for Public Safety Esri has thousands of customers worldwide who are using the transforming power of GIS technology to respond to disasters and

More information

Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration

Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration Promoting Rapid Tech Insertion and the Importance of Domestic and International Collaboration Security Network East Washington, D.C. May 2012 Anthony Ashley, PhD Director General Defence R&D Canada Centre

More information

Federal Emergency Preparedness and Response System

Federal Emergency Preparedness and Response System Annex L Federal Emergency Preparedness and Response System Date of Latest Version: October 2006 Summary of Significant Changes: Reflects the establishment of the new department Public Safety and Emergency

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software

Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software Incident Response Six Best Practices for Managing Cyber Breaches Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software www.encase.com 2014 Guidance Software Inc., All Rights

More information

PORT ASSESSMENT. Name of Port : Date : Reference: Questions GENERAL INFORMATION - ASSESSORS

PORT ASSESSMENT. Name of Port : Date : Reference: Questions GENERAL INFORMATION - ASSESSORS Name of Port : Date : Reference: Questions GENERAL INFORMATION - ASSESSORS PORT ASSESSMENT Details Notes 1 Date of assessment/survey 2 Name(s) of person(s) carrying out assessment 3 Relevant skills & expertise

More information

EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS

EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS Ian Green Manager, Cybercrime & Intelligence Commonwealth Bank of Australia Session ID: GRC T17 Session Classification: ADVANCED WHY? What keeps you

More information

EMERGENCY MANAGEMENT BRITISH COLUMBIA A STRATEGY TO ADVANCE SUPPORT FOR LOCAL AUTHORITY EMERGENCY MANAGEMENT PROGRAMS OCTOBER 14, 2015

EMERGENCY MANAGEMENT BRITISH COLUMBIA A STRATEGY TO ADVANCE SUPPORT FOR LOCAL AUTHORITY EMERGENCY MANAGEMENT PROGRAMS OCTOBER 14, 2015 EMERGENCY MANAGEMENT BRITISH COLUMBIA A STRATEGY TO ADVANCE SUPPORT FOR LOCAL AUTHORITY EMERGENCY MANAGEMENT PROGRAMS OCTOBER 14, 2015 1 MESSAGE FROM THE ASSISTANT DEPUTY MINISTER I am pleased to introduce

More information

How To Protect The Internet From Natural Disasters

How To Protect The Internet From Natural Disasters Network Security Policy: The U.S. Experience Patricia Cooper International Bureau U.S. Federal Communications Commission Network Security: The U.S. Experience Network Security: How we define it U.S. Approach:

More information

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM

Cyber, Social Media and IT Risks. David Canham (BA) Hons, MIRM IIA South Event 16 th June 2015 Cyber, Social Media and IT Risks 1 st and 2 nd Line Perspective David Canham (BA) Hons, MIRM Agenda This evening we ll cover the following: Who, why and what? Traditional

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]

More information

Assuring Telecom (Infrastructure and Services) An Operations Perspective

Assuring Telecom (Infrastructure and Services) An Operations Perspective Industry Canada Assuring Telecom (Infrastructure and Services) An Operations Perspective IC Security Roles and Activities Assure Telecom Infrastructure and Services Enhance Telecom Security Expertise and

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

Regional Transportation Management Centre

Regional Transportation Management Centre British Columbia Ministry of Transportation & Infrastructure Regional Transportation Management Centre Date: May, 2013 ITS Canada Conference Agenda Ministry Overview Existing ITS Initiatives Regional Transportation

More information

BIG DATA AND CYBERSECURITY:

BIG DATA AND CYBERSECURITY: BIG DATA AND CYBERSECURITY: Multi Stakeholder Threats and Opportunities A US Speakers Program Embassy of the United States, Serbia September 20-25, 2015 Anne C. Bader Founder The International Cybersecurity

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult

More information

CAPITAL REGION GIS SPATIAL DATA DEMONSTRATION PROJECT

CAPITAL REGION GIS SPATIAL DATA DEMONSTRATION PROJECT CAPITAL REGION GIS SPATIAL DATA DEMONSTRATION PROJECT DRAFT January 2013 Prepared by: O2 Planning + Design, Inc. The information contained in this document has been compiled by O2 Planning + Design Inc.

More information

Performing Advanced Incident Response Interactive Exercise

Performing Advanced Incident Response Interactive Exercise Performing Advanced Incident Response Interactive Exercise Post-Conference Summary Merlin Namuth Robert Huber SCENARIO 1 - PHISHING EMAILS... 3... 3 Mitigations... 3 SCENARIO 2 - IDS ALERT FOR PSEXEC...

More information

Protecting betting integrity

Protecting betting integrity Protecting betting integrity October 2013 1 Introduction 1.1 The UK Gambling Commission (the Commission) was set up under the Gambling Act 2005 to regulate commercial gambling in Great Britain. We are

More information

Contact Reporting Guidelines The Australian Government Contact Reporting Scheme

Contact Reporting Guidelines The Australian Government Contact Reporting Scheme Contact Reporting Guidelines The Australian Government Contact Reporting Scheme Version 1.0 Approved September 2010 Contents Introduction... 1 The role of ASIO... 1 Australian Government Contact Reporting

More information

Cyber Crime ACC Crime

Cyber Crime ACC Crime AGENDA ITEM 10 STRATEGIC POLICING AND CRIME BOARD 3 rd December 2013 Cyber Crime ACC Crime PURPOSE OF REPORT 1. The purpose of this report is to provide members of the Strategic Police and Crime Board

More information

Information security due diligence

Information security due diligence web applications and websites W A T S O N H A L L Watson Hall Ltd London 020 7183 3710 Edinburgh 0131 510 2001 [email protected] www.watsonhall.com Identifying information security risk for web applications

More information

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry

More information

Italy. EY s Global Information Security Survey 2013

Italy. EY s Global Information Security Survey 2013 Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information

More information

ongo Job Title: Digital Marketing Officer Department: PR & Marketing Team: Digital Services Team Grade: 7

ongo Job Title: Digital Marketing Officer Department: PR & Marketing Team: Digital Services Team Grade: 7 ongo Job Title: Digital Marketing Officer Department: PR & Marketing Team: Digital Services Team Grade: 7 Overall Purpose of Job Your job is to be the digital expert within our PR & Marketing team, driving

More information

Strategic Plan: Relentless Pursuit of Excellence Speed Skating in Canada 2012-2020 (DRAFT)

Strategic Plan: Relentless Pursuit of Excellence Speed Skating in Canada 2012-2020 (DRAFT) Strategic Plan: Relentless Pursuit of Excellence Speed Skating in Canada 2012-2020 (DRAFT) 90 Relentless Pursuit of Excellence Speed Skating in Canada 2012-2020 TABLE OF CONTENTS Page Introduction......

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

INFRAGARD.ORG. Portland FBI. Unclassified 1

INFRAGARD.ORG. Portland FBI. Unclassified 1 INFRAGARD.ORG Portland FBI 1 INFRAGARD Thousands of Members One Mission Securing Infrastructure The subject matter experts include: 2 INFRAGARD Provides a trusted environment for the exchange of Intelligence

More information

ISO27032 Guidelines for Cyber Security

ISO27032 Guidelines for Cyber Security ISO27032 Guidelines for Cyber Security Deloitte Point of View on analysing and implementing the guidelines Deloitte LLP Enterprise Risk Services Security & Resilience Contents Foreword 1 Cyber governance

More information

Incident Response 101: You ve been hacked, now what?

Incident Response 101: You ve been hacked, now what? Incident Response 101: You ve been hacked, now what? Gary Perkins, MBA, CISSP Chief Information Security Officer (CISO) Information Security Branch Government of British Columbia Agenda: threat landscape

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat

More information

FBI CHALLENGES IN A CYBER-BASED WORLD

FBI CHALLENGES IN A CYBER-BASED WORLD FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top

More information

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following

More information

CGI Cyber Risk Advisory and Management Services for Insurers

CGI Cyber Risk Advisory and Management Services for Insurers CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their

More information

Cyber Security Incident Reporting Scheme

Cyber Security Incident Reporting Scheme OCIO/G4.12a ISMF Guideline 12a Cyber Security Incident Reporting Scheme BACKGROUND Reporting cyber security incidents is a source of intelligence information that assists in the development of a greater

More information

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014 Knowing Your Enemy How Your Business is Attacked Andrew Rogoyski June 2014 Why Cyber is the New Security 1986: Lawrence Berkeley NL discovers attempt to copy US Government Information on Arpanet 1988:

More information

Cyber security trends & strategy for business (digital?)

Cyber security trends & strategy for business (digital?) Cyber security trends & strategy for business (digital?) Presentation by Anwer Yusoff Head, Industry & Business Development C y b e r S e c u r i t y M a l a y s i a NATIONAL CYBERSECURITY TECHNICAL SPECIALIST

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

integrating cutting-edge security technologies the case for SIEM & PAM

integrating cutting-edge security technologies the case for SIEM & PAM integrating cutting-edge security technologies the case for SIEM & PAM Introduction A changing threat landscape The majority of organizations have basic security practices in place, such as firewalls,

More information

Internet Security and Resiliency: A Collaborative Effort

Internet Security and Resiliency: A Collaborative Effort Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing

More information

Security Risk Assessment Tool

Security Risk Assessment Tool Security Risk Assessment Tool Version: (Draft) 24 April 2014 This tool was developed by the ACT Safety & Security Community of Practice (SSCP) for use by ACT Alliance members and partners. 1. Purpose of

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

CYBER SECURITY TRAINING SAFE AND SECURE

CYBER SECURITY TRAINING SAFE AND SECURE CYBER SECURITY TRAINING KEEPING YOU SAFE AND SECURE Experts in Cyber Security training. Hardly a day goes by without a cyber attack being reported. With this ever-increasing threat there is a growing need

More information

Technology and Cyber Resilience Benchmarking Report 2012. December 2013

Technology and Cyber Resilience Benchmarking Report 2012. December 2013 Technology and Cyber Resilience Benchmarking Report 2012 December 2013 1 Foreword by Andrew Gracie Executive Director, Special Resolution Unit, Bank of England On behalf of the UK Financial Authorities

More information

Ministry of Small Business,Technology and Economic Development

Ministry of Small Business,Technology and Economic Development Ministry of Small Business,Technology and Economic Development 2 BRITISH COLUMBIA S TRADE AND INVESTMENT STRATEGY FOR CHINA Why China is Important to British Columbia China is the world s fourth largest

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities 16 Oct 2012 Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities Bradford Willke Cyber Security Advisor, Mid Atlantic Region National Cyber Security Division (NCSD) Office

More information

DRAFT Report on Office of the Superintendent of Financial Report on Institutions Office of the Superintendent of Financial

DRAFT Report on Office of the Superintendent of Financial Report on Institutions Office of the Superintendent of Financial DRAFT Report on Office of the Superintendent of Financial Report on Institutions Office of the Superintendent of Financial Institutions Regulation Sector Approvals & Precedents Group Office of the Chief

More information

Application Guidance CCP Penetration Tester Role, Practitioner Level

Application Guidance CCP Penetration Tester Role, Practitioner Level August 2014 Issue No: 1.0 Application Guidance CCP Penetration Tester Role, Practitioner Level Application Guidance CCP Penetration Tester Role, Practitioner Level Issue No: 1.0 August 2014 This document

More information

Canada 2017! A Digital Nation Focus on ICT

Canada 2017! A Digital Nation Focus on ICT Canada 2017! A Digital Nation Focus on ICT Growing Canada s Prosperity Used for Ministerial Briefing www.itac.ca Page 1 Introduction ICT & Canada s prosperity Importance of ICT to Canada s prosperity:

More information

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies

Aon Risk Solutions Aon Crisis Management. Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies Aon Risk Solutions Crisis Management Consulting Terrorism Probable Maximum Loss (PML) Studies A terrorist incident at or near your operations, could result in human casualties, property damage, business

More information

Business Risk Management - Top 10 Questions to Ask

Business Risk Management - Top 10 Questions to Ask How to Ace IT Governance Without Tech Expertise 50 POWERFUL QUESTIONS READY TO ASK AT YOUR NEXT BOARD MEETING Corporate Director and Creator of THE BOARDROOM BLUEPRINT TM OVERVIEW 50 POWERFUL I.T. QUESTIONS

More information

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia

CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For

More information

Working Towards the 2020 Tokyo Olympics

Working Towards the 2020 Tokyo Olympics Working Towards the 2020 Tokyo Olympics - The Current Situation in 2015 Mariko Miya Cyber Defense Institute, Inc. [email protected] Agenda 1. Introduction 2. The current situation in Japan 2015 Analytics

More information

Connect Smart for Business SME TOOLKIT

Connect Smart for Business SME TOOLKIT Protect yourself online Connect Smart for Business SME TOOLKIT WELCOME To the Connect Smart for Business: SME Toolkit The innovation of small and medium sized enterprises (SMEs) is a major factor in New

More information

Major Incident Procedures. What businesses and the voluntary sector need to know

Major Incident Procedures. What businesses and the voluntary sector need to know Major Incident Procedures What businesses and the voluntary sector need to know Introduction This guide is designed to increase the understanding of the roles and responsibilities of the emergency services

More information

G7 Opportunities for Collaboration

G7 Opportunities for Collaboration ANNEX G7 Opportunities for Collaboration To strengthen international cooperation and collaboration and to achieve the actions in the G7 ICT Ministers Joint Declaration, G7 members seek to share information

More information

Internet threats: steps to security for your small business

Internet threats: steps to security for your small business Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential

More information

EMERGENCY COMMUNICATIONS SERVICE DELIVERY IN BRITISH COLUMBIA

EMERGENCY COMMUNICATIONS SERVICE DELIVERY IN BRITISH COLUMBIA EMERGENCY COMMUNICATIONS SERVICE DELIVERY IN BRITISH COLUMBIA Police Communication Centres and 911 Public Safety Answering Points STRATEGIC VISION SUMMARY OF CONSULTATION COMMENTS JULY 2015 Copyright 2015,

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

Cyber Security. John Leek Chief Strategist

Cyber Security. John Leek Chief Strategist Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity

More information

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany.

Security systems URBAN SECURITY. Information systems protecting major cities with a main goal: to guarantee citizen s well being. indracompany. Security systems URBAN SECURITY Information systems protecting major cities with a main goal: to guarantee citizen s well being indracompany.com isafety Urban Security Supports and strengthens coordination

More information

BT Assure Rethink the Risk

BT Assure Rethink the Risk BT Assure Rethink the Risk Analyst and Consultant Update May 2012 BT Assure. Security that matters Today's agenda Introductions Neil Sutton Vice President, Global Portfolio 3 Minutes BT Assure Overview

More information