Keeping New Zealand s Economy Cyber Secure
|
|
- Julianna Allison
- 8 years ago
- Views:
Transcription
1 Keeping New Zealand s Economy Cyber Secure CYBER SECURITY SUMMIT 5 May 2016
2 MINISTERIAL FOREWORD Kia ora and welcome to New Zealand s first ever Cyber Security Summit. We can all agree that cyber security is critical to our nation s economic prosperity. Since the Government launched our refreshed Cyber Security Strategy in December, the business community s level of awareness of, and interest in, cyber threats has continued to grow. From the boardroom to the front desk, businesses are rightly identifying cyber security as a key issue for them. Almost $257 million was lost to cybercrime in the past year, affecting around 856,000 New Zealanders 1. But this is just the tip of the iceberg. As we further embrace the digital era, the complexity and sophistication of cyber threats will continue to grow. While we re all cognisant of the harm cyber-attacks can cause, how we should respond isn t always clear. New Zealand s inaugural Cyber Security Summit is about bringing together our top business and government leaders to kick-start an important discussion about how we keep our economy cyber secure. At the moment it may not be obvious who does what or where to go when you face an issue. There are considerable overlaps and gaps. The Government also accepts that we don t have all the answers and can t solve this in isolation. What is evident is that we need a joined up response the private and public sectors working together to share information and expertise. The Summit is an opportunity for chairs and chief executives from across New Zealand to continue the conversation around how as a country we tackle the threat of cybercrime, and improve our resilience and security in this increasingly digital age. I m sure you ll find the summit informative and provocative. We ve drawn on expertise and insights from across the world and attendees will hear first-hand from our Prime Minister John Key on how the Government is beefing up our cyber security architecture to keep New Zealanders safe. Thank you for partaking in this important discussion. Your attendance speaks to how seriously New Zealand is taking this issue. I look forward to an interesting and robust discussion throughout the day. Hon Amy Adams Minister for Communications Protect yourself online The Connect Smart partnership is a public-private collaboration focused on driving cyber security improvement in New Zealand. All New Zealanders will benefit if we can unlock the potential of the internet by using it in a safe and secure way. Facilitators FRANCES VALINTINE Founder, The Mind Lab by Unitec, Education Futurist Frances Valintine is an education futurist, committed to shifting education practice, policy and understanding to contextualise it within a contemporary global environment. Frances has been an active leader in education for more than 20 years, founding the Media Design School in In 2013, Frances established The Mind Lab, later The Mind Lab by Unitec. Frances holds a range of governance roles and is on the board of Callaghan Innovation, Education New Zealand, NZ Tech, New Zealand Game Developers Association, Auckland Screen and Digital Content, Santa Fe University of Art & Design and Talentnomics, Washington DC. She is also a member of the Ministry of Business, Innovation & Employment s Small Business Development Group and Global Women. PAUL ASH Director, National Cyber Policy Office, Department of Prime Minister and Cabinet The National Cyber Policy Office (NCPO) coordinates and leads the development and implementation of New Zealand cyber security policy. Paul has led the NCPO since it was established in July Paul was previously a career diplomat, most recently Deputy Head of Mission in Brussels from 2008 to Paul has also had postings to Honiara, Beijing and Taipei, and has worked in the International Security and Disarmament, Pacific, United Nations and Human Rights, and Development divisions of MFAT in Wellington. 1 Norton Cybersecurity Insights Report, November 2015:
3 CYBERSECURITY a public private partnership NEW ZEALAND BUSINESSES RELY ON THE INTERNET EVERYDAY 96 % OF NEW ZEALAND BUSINESSES have access to the Internet 1 90 % OF NEW ZEALAND BUSINESSES are using the Internet for finance, largely online banking 1 WHAT S AT STAKE FOR NEW ZEALAND? $34 billion COULD BE ADDED TO THE NEW ZEALAND ECONOMY if businesses made more effective use of the Internet million MOBILE PHONES ARE CONNECTED TO THE INTERNET 86 active connections for every 100 New Zealanders 3 Only 23% of boards of directors ACTIVELY PARTICIPATE IN SECURITY POLICY 2 AS A RANSOMWARE TARGET, New Zealand ranked 4th in the Asia Pacific and 21st globally with an average of 108 ransomware attacks per day 4 FOUR INTERSECTING GOALS TO ACHIEVE CYBER SECURITY CYBER RESILIENCE New Zealand s information infrastructures can resist cyber threats and we have the tools to protect our national interests CYBER CAPABILITY New Zealand businesses, and government agencies understand cyber threats and have the capability to protect themselves ADDRESSING CYBERCRIME New Zealand improves its ability to prevent, investigate and respond to cybercrime INTERNATIONAL COOPERATION New Zealand protects and advances its interests on cyberspace issues internationally 1 The Value of Internet Services to New Zealand Businesses, 31 March 2014: 2 PwC Global State of Information Security Survey 2016, October 2015: 3 Internet Service Provider Survey, October 2015: 4 Internet Security Threat Report, April 2016:
4 SUMMIT PROGRAMME 8.15AM 9.00AM Registration CYBER SECURITY SUMMIT OPENING SESSION 9.00AM 9.20AM Welcome by Paul Ash, Director of the National Cyber Policy Office, Department of the Prime Minister and Cabinet Address by the Prime Minister, Rt Hon John Key Keeping New Zealand s Economy Cyber Secure KEYNOTE SPEECHES 9.20AM 9.45AM 9.45AM 10.15AM 10.15AM 10.30AM Jim Lewis, Senior Vice President and Program Director, Center for Strategic and International Studies (CSIS) Matt Thomlinson, Vice President of Security, Microsoft Morning tea SESSION 1: WHAT S AT STAKE FOR NEW ZEALAND? UNDERSTANDING THE OPPORTUNITIES AND THREATS 10.30AM 11.15AM Achieving the vision of a secure, resilient and prosperous online New Zealand means that individuals are protected online and New Zealand s businesses can function, grow and innovate. Cyber security has the potential to be used as a point of positive, competitive advantage internationally. New Zealand s Cyber Security Strategy, December 2015 Panel discussion facilitated by Frances Valintine, Founder Tech Futures Lab; Founder and Chair of The Mind Lab by Unitec Major General (Ret) Earl D Matthews, Vice President, Enterprise Security Solutions, Hewlett Packard Enterprise Services, U.S. Public Sector Lillian Grace, Chief Executive, Figure.NZ Dr Patrick Strange, Chair Chorus; former Chief Executive Transpower Steve Glynn, Chief Information Security Officer, ANZ Bank KEYNOTE SPEECH 11.15AM 11.45AM Richard Bejtlich, Chief Security Strategist, FireEye, Non-resident Senior Fellow, The Brookings Institution MINISTERIAL ADDRESS 11.45AM MIDDAY Address by Minister for Communications, Hon Amy Adams SESSION 2: A CALL TO ACTION: MAKING NEW ZEALAND SECURE, RESILIENT AND PROSPEROUS ONLINE MIDDAY 12.45PM The government has a role to play in cyber security but not on its own. Close partnerships with the private sector and non-government organisations are required. Businesses drive the New Zealand economy and depend on the Internet and networked technology. They must protect the information that is critical to their commercial success. The private sector owns and operates the telecommunications systems. The private sector and technical community also have considerable cyber security expertise. New Zealand s Cyber Security Strategy, December 2015 Panel discussion facilitated by Frances Valintine, Founder Tech Futures Lab; Founder and Chair of The Mind Lab by Unitec Dr Rick Ede, Chief Executive, Unitec Institute of Technology Jo Healey, Chief Executive, Dimension Data Major General Stephen Day, former head of the Australian Cyber Security Centre Rick Shera, Partner Lowndes Jordan (IT/IP specialist); Chair of NetSafe; Director, Network for Learning SESSION 3: WHAT ARE THE ODDS OF GETTING HACKED? 12.45PM 1.00PM 1.00PM 1.45PM John Allen, Chief Executive, NZ Racing Board Networking lunch
5 #CYBERNZ16 SESSION 4: SUMMING UP THE KEY ISSUES FOR NEW ZEALAND 1.45PM 2.30PM Paul Ash, Director of the National Cyber Policy Office, Department of the Prime Minister and Cabinet, welcomes participants to the afternoon sessions The panel sums up the key messages from the morning s discussions. Richard Salgado, Global Director of Information Security, Google David Havercroft, Chief Operating Officer, Spark Kendra Ross, Co-Founder, Duo NZ, 1stTuesday and isanz Jordan Carter, Chief Executive, Internet NZ Toby Gee, Special Counsel, Minter Ellison Tony Wilson, Head of Information Security, BNZ WORKSHOPS 1 & PM 3.15PM 3.15PM 3.30PM WORKSHOPS 3 & PM 4.15PM WORKSHOP 1: CLOSING THE CYBER SECURITY SKILLS GAP New Zealand s cyber security expertise needs to grow so that businesses and organisations can source the technical staff required to carry out ICT security. At the same time, the education and training system should produce ICT users at all levels with the skills to put in place basic cyber hygiene practices. Facilitator: David Eaton, Chief Technology Officer (NZ), Hewlett Packard Enterprise (NZ) Afternoon tea WORKSHOP 3: MAKING A DIFFERENCE TO THE CYBER SECURITY OF SMALL BUSINESSES Small and medium enterprises (SMEs) play a huge role in New Zealand s economic growth; it is important that they are equipped to protect their business information... A new cyber credentials scheme is proposed for SMEs. The scheme will promote to the SME audience the core actions that, if implemented properly, can make a big difference to their cyber security. Facilitator: Ken Wallace, New Zealand practice leader for Technology Risk and Assurance, EY Introductory comments: Minister for Small Business, Hon Craig Foss WORKSHOP 2: BUILDING A CERT It is proposed that a national CERT be established. This institution would act as a central reporting mechanism for the full range of cyber incidents, triaging incident response to the relevant separate organisation and ensuring technical advice gets to the organisations that need it in real-time. Facilitator: Kirk Hope, Chief Executive, Business New Zealand WORKSHOP 4: CONNECTING SMART AND PREVENTING CYBERCRIME Achieving [the Cyber Capability] goal means that New Zealanders at all levels will have the skills and tools to protect themselves online, making it harder for malicious cyber actors to steal private data, identity information or cause damage to information systems. Prevention first is at the heart of our approach to cybercrime giving New Zealanders the tools to change their online behaviour. Facilitator: Kevin McDonald, Chief Risk Officer, ASB WRAP-UP: KEY OUTCOMES FROM THE FOUR WORKSHOPS 4.15PM 5.00PM 5.00PM 6.30PM The four facilitators sum up the key messages from the workshops. David Eaton, Chief Technology Officer (NZ), Hewlett Packard Enterprise (NZ) Kirk Hope, Chief Executive, Business New Zealand Ken Wallace, New Zealand practice leader for Technology Risk and Assurance, EY Kevin McDonald, Chief Risk Officer, ASB Networking drinks
6 INTERNATIONAL KEYNOTE SPEAKERS Jim Lewis SENIOR VICE PRESIDENT AND PROGRAM DIRECTOR, CENTER FOR STRATEGIC AND INTERNATIONAL STUDIES Matt Thomlinson GLOBAL VICE-PRESIDENT OF SECURITY, MICROSOFT Richard Bejtlich CHIEF SECURITY STRATEGIST, FIREEYE Jim Lewis is an acknowledged international expert and researcher on cyber security. He is currently a Senior Fellow and Program Director at the Center for Strategic and International Studies (CSIS) and directs its Technology Programme. Before joining CSIS, he worked at the Departments of State and Commerce as a Foreign Service Officer and as a member of the Senior Executive Service. His government experience includes work on politico-military assignments. He helped to develop initial US policies for Internet security and encryption. Since moving to CSIS, Lewis has authored more than 100 publications. His recent work focuses on cybersecurity, including Securing Cyberspace for the 44th Presidency, the best-selling report whose contributions to US policy were publically recognised by the White House. Lewis current research examines Internet sovereignty, cybersecurity, warfare, strategy, and technological change. He received his Ph.D. from the University of Chicago. Matt Thomlinson is Vice President, Cloud and Enterprise Security. He leads the organization responsible for Microsoft s security response, innovative security solutions for customer protection, and cyber threat intelligence. Matt s career spans more than 20 years at Microsoft where he has contributed to a number of security technologies. He is a 5-year board member and former chairman of NIST s Information Security & Privacy Advisory Board (ISPAB). In 2014, Matt was recognized as a Federal 100 winner for his work to secure the US federal government, and a 2015 Computerworld Premier 100 IT Leader. He is the inventor or co-inventor of over 20 patents on technologies ranging from secure secret storage and random number generators, to various vulnerability mitigation techniques. He holds both Master s and Bachelor s degrees in Electrical Engineering from the University of Washington. Richard Bejtlich is Chief Security Strategist at FireEye, and was Mandiant s Chief Security Officer when FireEye acquired Mandiant in He is a non-resident senior fellow at the Brookings Institution and an advisor to Threat Stack, Sqrrl, and Critical Stack. Richard was previously Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). Richard began his digital security career as a military intelligence officer in 1997 at the Air Force Computer Emergency Response Team (AFCERT), Air Force Information Warfare Center (AFIWC), and Air Intelligence Agency (AIA). Richard is a graduate of Harvard University and the United States Air Force Academy. He has a Bachelor of Science in History and a Bachelor of Science in Political Science from the United States Air Force Academy, and a Master of Public Policy from Harvard University. SPONSORS TERABYTE KILOBYTE BYTE
Cyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationGood morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.
Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND
More informationCyber Security Strategy
Cyber Security Strategy 2015 Action Plan A LIVING ACTION PLAN WITH ANNUAL REVIEWS New Zealand s Cyber Security Strategy provides a single cohesive framework to ensure that New Zealand is secure, resilient
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationSecuring the Nation: Creating cyber security, resilience and readiness
NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:
More informationGeorgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Oversight and Government Reform Subcommittee on Information Technology
More information40 Years of NZ-China Relations
China Symposium 2012 40 Years of NZ-China Relations To mark the 40th Anniversary of the Establishment of New Zealand-China Diplomatic Relations Wednesday 5th September 2012, 9am-6.30pm Parliament Buildings
More informationTestimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security
Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United
More informationGOVERNANCE SYMPOSIUM 2016. Friday, 22nd April 2016
GOVERNANCE SYMPOSIUM 2016 Friday, 22nd April 2016 GOVERNANCE SYMPOSIUM 2016 John Ralston Chairman, AISNSW Board Friday, 22 nd April 2016 Sydney Cricket Ground, Driver Ave, Moore Park, Sydney The introduction
More informationCyber Security in the Financial Industry
Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President
More informationStatement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationCYBER LAW CONFERENCE CONFERENCE. May 2016. CPD hours
7 CPD hours CONFERENCE CYBER LAW CONFERENCE May 2016 FROM THE CHAIR...in today s technological age, lawyers must at least be familiar with technology and know how it works and how to use it. This Conference
More informationWelcome and introduction Steve Perdia, General Manager Strategy and Planning, Canterbury Development Corporation
1.00pm 1.30pm Registrations open Session One Welcome and introduction Steve Perdia, General Manager Strategy and Planning, Canterbury Development Corporation A product is just the start: Building strong
More informationAISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK
1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association
More informationNEW ZEALAND S CYBER SECURITY STRATEGY
Appendix 1 NEW ZEALAND S CYBER SECURITY STRATEGY June 2011 New Zealand Government 7 June 2011 ISBN: 978-0-478-38200-6 www.med.govt.nz/cyberstrategy MED11 Foreword from the Minister The Internet and digital
More informationSafety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
More informationCyber Risk & Insurance
Cyber Risk & Insurance The Risk Managers Forum Thursday 27 November 2014 One-day conference Grange City Hotel, 8-14 Cooper s Row, London EC3N 2QB Event sponsor Headline sponsor Cyber Risk & Insurance The
More informationCyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage
Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies
More informationProfessor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC
Business Improvement in Universities Realigning services to drive efficiency 15th & 16th June 2016, CQ Functions Melbourne Key Speakers Benefits of attending Paul Duldig Head of University Services THE
More informationPartnership prospectus
Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office
More informationCyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate
Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation
More informationPatrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation
Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie Developments in Security Regulation Agenda Introduction PM & C Cybersecurity Review Mandatory Data Retention Legislation Overview
More informationRUSI Cyber Security Conference 2011 Cyber Challenges for National Security
RUSI Cyber Security Conference 2011 Cyber Challenges for National Security 15-16 November 2011 Day One: Tuesday 15 November 2011 0830 Registration 0900 Morning Keynote Address Professor Michael Clarke,
More informationwww.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
More informationTestimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies
Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan
More informationAbout Our 2015 WTA Cyber Security Speakers and Sessions
About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose
More informationthink a paradigm shift
think a paradigm shift INTELLIGENCE DESIGN INNOVATIVE think is a great Australian story, head quartered in Melbourne and fast becoming the leader in innovation and a market disrupter within the e-procurement
More informationPacific Islands Telecommunications Association
Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: pita@connect.com.fj www.pita.org.fj INVITATION
More informationBuilding Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch
Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
More information2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow
2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer
More informationTHINK. CLOUD VENDORS. December 9 th 2014. Level39 One Canada Square Canary Wharf London E14 5AH. Venue: Tele: www.thinkcloudvendors.
THINK. CLOUD VENDORS December 9 th 2014 Venue: Tele: Level39 One Canada Square Canary Wharf London E14 5AH 0203 668 3600 www.thinkcloudvendors.com Day Summary 08:30-09:00 Coffee, Registration & Networking
More informationWRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
More informationBusiness Plan 2012/13
Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,
More informationAustralia New Zealand Testing Board ANZTB SIGIST. Presenter: tbc. June 2009
ANZTB SIGIST Presenter: tbc June 2009 1 Agenda ANZTB Opening Address _ Leanne Howard (10 mins) Australian Computer Society (ACS) Membership Laurie Carmichael, ACS (15 mins) Test Recruitment what skills
More informationIT SERVICE SCIENCE A FUTURE IN. IT Service Science
IT SERVICE SCIENCE A FUTURE IN IT Service Science WHAT IS SERVICE SCIENCE? IT service means different things in different contexts. It can be a function like online shopping, the delivery of a program
More informationOur Sporting Future Preliminary Programme. Wednesday 21 st October Pre Conference Workshops. 1030-1730 REGISTRATION (Ground floor, main entrance)
1030-1730 REGISTRATION (Ground floor, main entrance) 1200-1230 LUNCH ON ARRIVAL (Meeting Room 5 and 6 Foyer, first floor) Wednesday 21 st October Pre Conference Workshops 1230-1505 Workshops: Meeting Room
More informationPanel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
More informationESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationSCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
More informationNational Institute of Standards and Technology Smart Grid Cybersecurity
National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair Victoria.yan@nist.gov 1 The National Institute of Standards
More informationIntroduction to Cyber Security
Introduction to Cyber Security Hossein Sarrafzadeh HoD Computing Director Cyber Security Centre CS4HS Workshop You are sitting in New Zealand s first joint research centre for cyber security Centre of
More informationTestimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology
Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois
More informationThank you for your very kind introduction.
AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.
More informationNational Initiative for Cyber Security Education
2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women
More informationConnect Smart for Business SME TOOLKIT
Protect yourself online Connect Smart for Business SME TOOLKIT WELCOME To the Connect Smart for Business: SME Toolkit The innovation of small and medium sized enterprises (SMEs) is a major factor in New
More informationE-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION
1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information
More informationSECURING PAYMENTS IN THE CYBER WORLD
The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November
More informationCONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response
CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing
More informationGUERNSEY CYBER SECURITY REVIEW
GUERNSEY CYBER SECURITY REVIEW EXECUTIVE SUMMARY FOREWORD I am delighted that the States of Guernsey has completed a detailed cyber-security review which looks at government, businesses and individuals.
More informationHighlights from the Security Awareness Special Interest Group (SASIG) New Year 2014 event:
Highlights from the Security Awareness Special Interest Group () New Year 2014 event: Cyber security adopting a new approach to answer the Board s concerns Hosted by EY: 14th January 2014 The Security
More informationBSA GLOBAL CYBERSECURITY FRAMEWORK
2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access
More information2015 CYBERSECURITY CAMPAIGN. Improving Today. Protecting Tomorrow. Page 1
2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow Page 1 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow JOIN THE CYBERSECURITY EDUCATION AND FRAMEWORK AWARENESS CAMPAIGN
More informationAnalytics Day. By invitation only. 6 th Annual. Friday, April 29, 2016 Oklahoma State University ConocoPhillips OSU Alumni Center Stillwater, OK
6 th Annual Analytics Day By invitation only Friday, April 29, 2016 Oklahoma State University ConocoPhillips OSU Alumni Center Stillwater, OK Program sponsored by SAS and the OSU Department of Marketing
More informationCYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading
CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical
More information20-21 April 2016. Beurs van Berlage, Amsterdam, The Netherlands. Netherlands-OECD Global Symposium on FINANCIAL. RESILIENCE throughout Life
20-21 April 2016 Beurs van Berlage, Amsterdam, The Netherlands Netherlands-OECD Global Symposium on FINANCIAL RESILIENCE throughout Life PROGRAMME 20-21 APRIL PROGRAMME APRIL 20 TH 2016 10:00-10:50 OPENING
More informationCyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
More informationAUSTRALIA S CYBER SECURITY STRATEGY. Enabling innovation, growth & prosperity
AUSTRALIA S CYBER SECURITY STRATEGY Enabling innovation, growth & prosperity Australia s Cyber Security Strategy Commonwealth of Australia 2016 ISBN 978-1-925238-61-7 Australia s Cyber Security Strategy
More informationCyber Security Evolved
Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are
More informationSPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF
SPEECH Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH BY PERMANENT SECRETARY (DEFENCE) MR CHAN YENG KIT, AT THE CYBER DEFENDERS DISCOVERY CAMP AWARDS CEREMONY
More informationNational Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications
OPERATIONAL REQUIREMENTS DOCUMENT National Cyber Security Framework and Protocol Contents for securing digital information in networked critical infrastructures and communications 1. General Description
More informationChair. Presenters. Casey Plunket, Chapman Tripp, Auckland. Bruce Bernacchi, GE Finance and Insurance, Auckland
Chair Casey Plunket, Chapman Tripp, Auckland Casey has extensive experience in the tax aspects of corporate acquisitions, mergers and restructurings, both on-shore and cross-border. He has advised US,
More informationEmotion, behaviour and applied psychology in diabetes education
Emotion, behaviour and applied psychology in diabetes education ADEA Thought Leadership Lecture series supported by 1 ADEA would like to appreciate the support of our partner universities This program
More informationEU Cybersecurity: Ensuring Trust in the European Digital Economy
EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'
More informationStatement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the
Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology
More informationSYMPOSIUM PROGRAM DAY ONE
Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief
More informationLAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference
LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference 18 March, 2015 Pullman, Auckland EY s ediscovery Services offer rapidly deployable litigation support and professional Gold sponsor Proudly
More informationA social marketing approach to behaviour change
A social marketing approach to behaviour change An e-learning course in using social marketing to change or sustain behaviour About The NSMC Established by Government in 2006, we are the centre of excellence
More informationFor Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
More informationREPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY
REPUBLIC OF MAURITIUS 5555555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555555555555555555555555 NATIONAL CYBER SECURITY STRATEGY 2014-2019 The time has come
More informationChair Cabinet Committee on State Sector Reform and Expenditure Control
Office of the Minister of State Services Chair Cabinet Committee on State Sector Reform and Expenditure Control REPORT OF THE GOVERNMENT CHIEF INFORMATION OFFICER ON THE REVIEW OF PUBLICLY ACCESSIBLE INFORMATION
More informationU.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE
U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE February 27, 2015 TO: FROM: RE: Members, Subcommittee on Oversight and Investigations Committee Majority Staff Hearing on Understanding the
More informationGEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT
GEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT INTERNATIONAL CONFERENCE ON CYBER ENGAGEMENT: ENHANCING COOPERATION ACROSS DIGITAL BORDERS Monday, April 27, 2015 8:00 a.m. 6:30
More informationHalo. NZ s leading business conferences. Business Intelligence. From
From Supporting Organisations Silver Sponsors Halo Business Intelligence NZ s leading business conferences DAY 1 19th February 8.30 Registration and coffee 9.00 Opening remarks from the Chair David Bloch,
More informationThe Top Ten of Information Security - For 2015
7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.
More informationBefore the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives
Testimony of Fiona M. Alexander Associate Administrator, Office of International Affairs National Telecommunications and Information Administration United States Department of Commerce Before the Committee
More informationOrthodox, maverick and seriously left field. Anne-Marie Slattery (Australian Government Libraries Information Network) Is advocacy the answer?
URLs/AGLIN Seminar Advocacy for Libraries Program 28th August National Library of Australia 8:45am-9:00am 9:00am 9:15am 9:15am 10:00am 10:00am 10:30am 10:30am 11:00am 11:00am 11:30am 11:30am 12:15pm 12:15pm
More informationStatement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy
Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee
More informationSUMMIT PROGRAM. AIIA is on Twitter! Follow us at @AIIA_ICT and join the conversation using #AIIASummit and #IoT
SUMMIT PROGRAM AIIA is on Twitter! Follow us at @AIIA_ICT and join the conversation using #AIIASummit and #IoT Elizabeth Vega AIIA Summit 2015: Navigating the Internet of Things Thank you for attending
More informationPROFESSIONAL SERVICES MARKETING. www.marketingcollege.com CIM PROFESSIONAL CERTIFICATE CIM PROFESSIONAL DIPLOMA CIM CHARTERED DIPLOMA
PROFESSIONAL SERVICES MARKETING DISTANCE LEARNING COURSES AT CAMBRIDGE MARKETING COLLEGE CIM PROFESSIONAL CERTIFICATE CIM PROFESSIONAL DIPLOMA CIM CHARTERED DIPLOMA www.marketingcollege.com CIM CERTIFICATE
More informationINVITATION. Smart Grid & Cyber Security Conference
INVITATION Smart Grid & Cyber Security Conference 20 June 2013 Designing the Future for an Intelligent Energy Infrastructure Risk management and protection of critical infrastructure in an uncertain world
More informationTHE HUMAN COMPONENT OF CYBER SECURITY
cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the
More informationThe National Skills Academy for IT. Cyber Security
The National Skills Academy for IT Cyber Security 1 WELCOME The Rt. Hon. David Blunkett welcomes employers and stakeholders from the Cyber Security Industry NATIONAL SKILLS ACADEMY for IT PLANS FOR TRAINING
More informationThe Dow Chemical Company. statement for the record. David E. Kepler. before
The Dow Chemical Company statement for the record of David E. Kepler Chief Sustainability Officer, Chief Information Officer, Business Services and Executive Vice President before The Senate Committee
More informationHis Hon Judge David Harvey, Auckland District Court. Richard Best, Richard Best Law, Best + Hancock Consortium, Wellington
CHAIR His Hon Judge David Harvey, Auckland District Court Judge Harvey was appointed a District Court Judge in 1989. He has been closely involved with Information Technology initiatives involving the Judiciary
More informationCyber attack and incident response
Cyber attack and incident response Private sector s perspective for public/private information sharing 6 June 2012 Octopus Conference at Strasbourg Tomohiko Yamakawa 0 Copyright 2012 NTT All rights reserved.
More informationFOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks
F-43 FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks Possible Ouestion Why has the Government not confronted China about cyber attacks including on DFAT, such as those aired
More informationGregg Gerber. Strategic Engagement, Emerging Markets
Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005
More informationCyber security the facts
Cyber security the facts By Dr Carolyn Patteson, Executive Manager, CERT Australia The cyber threat is real and ever present and every business is at risk. Australia s security and intelligence agencies
More informationTackling fraud in the charity sector Making your money count
Supported by Tackling fraud in the charity sector Making your money count Friday 30 October 2015 Royal College of Physicians, London A conference run by the charity sector for the charity sector About
More informationCyber crime risk management protecting your business 4 November 2015
Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC
More informationwww.pwc.nl/cybersecurity Cyber security Building confidence in your digital future
www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence
More informationProtecting Malaysia in the Connected world
Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE
More informationDIGITAL DISRUPTION WHEN YOU LEAST EXPECT (OR WANT) IT
DIGITAL DISRUPTION WHEN YOU LEAST EXPECT (OR WANT) IT Craig Pitts Global Information Security Solutions Architect Lead Mondelez International June 2015 Introduction Who? What? Where? Craig Pitts Career
More informationCybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector
Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector 15 April 2015, Brussels Memorandum involved in cybersecurity to work on Dr Steve Purser Head of Core Operations
More information