Keeping New Zealand s Economy Cyber Secure

Size: px
Start display at page:

Download "Keeping New Zealand s Economy Cyber Secure"

Transcription

1 Keeping New Zealand s Economy Cyber Secure CYBER SECURITY SUMMIT 5 May 2016

2 MINISTERIAL FOREWORD Kia ora and welcome to New Zealand s first ever Cyber Security Summit. We can all agree that cyber security is critical to our nation s economic prosperity. Since the Government launched our refreshed Cyber Security Strategy in December, the business community s level of awareness of, and interest in, cyber threats has continued to grow. From the boardroom to the front desk, businesses are rightly identifying cyber security as a key issue for them. Almost $257 million was lost to cybercrime in the past year, affecting around 856,000 New Zealanders 1. But this is just the tip of the iceberg. As we further embrace the digital era, the complexity and sophistication of cyber threats will continue to grow. While we re all cognisant of the harm cyber-attacks can cause, how we should respond isn t always clear. New Zealand s inaugural Cyber Security Summit is about bringing together our top business and government leaders to kick-start an important discussion about how we keep our economy cyber secure. At the moment it may not be obvious who does what or where to go when you face an issue. There are considerable overlaps and gaps. The Government also accepts that we don t have all the answers and can t solve this in isolation. What is evident is that we need a joined up response the private and public sectors working together to share information and expertise. The Summit is an opportunity for chairs and chief executives from across New Zealand to continue the conversation around how as a country we tackle the threat of cybercrime, and improve our resilience and security in this increasingly digital age. I m sure you ll find the summit informative and provocative. We ve drawn on expertise and insights from across the world and attendees will hear first-hand from our Prime Minister John Key on how the Government is beefing up our cyber security architecture to keep New Zealanders safe. Thank you for partaking in this important discussion. Your attendance speaks to how seriously New Zealand is taking this issue. I look forward to an interesting and robust discussion throughout the day. Hon Amy Adams Minister for Communications Protect yourself online The Connect Smart partnership is a public-private collaboration focused on driving cyber security improvement in New Zealand. All New Zealanders will benefit if we can unlock the potential of the internet by using it in a safe and secure way. Facilitators FRANCES VALINTINE Founder, The Mind Lab by Unitec, Education Futurist Frances Valintine is an education futurist, committed to shifting education practice, policy and understanding to contextualise it within a contemporary global environment. Frances has been an active leader in education for more than 20 years, founding the Media Design School in In 2013, Frances established The Mind Lab, later The Mind Lab by Unitec. Frances holds a range of governance roles and is on the board of Callaghan Innovation, Education New Zealand, NZ Tech, New Zealand Game Developers Association, Auckland Screen and Digital Content, Santa Fe University of Art & Design and Talentnomics, Washington DC. She is also a member of the Ministry of Business, Innovation & Employment s Small Business Development Group and Global Women. PAUL ASH Director, National Cyber Policy Office, Department of Prime Minister and Cabinet The National Cyber Policy Office (NCPO) coordinates and leads the development and implementation of New Zealand cyber security policy. Paul has led the NCPO since it was established in July Paul was previously a career diplomat, most recently Deputy Head of Mission in Brussels from 2008 to Paul has also had postings to Honiara, Beijing and Taipei, and has worked in the International Security and Disarmament, Pacific, United Nations and Human Rights, and Development divisions of MFAT in Wellington. 1 Norton Cybersecurity Insights Report, November 2015:

3 CYBERSECURITY a public private partnership NEW ZEALAND BUSINESSES RELY ON THE INTERNET EVERYDAY 96 % OF NEW ZEALAND BUSINESSES have access to the Internet 1 90 % OF NEW ZEALAND BUSINESSES are using the Internet for finance, largely online banking 1 WHAT S AT STAKE FOR NEW ZEALAND? $34 billion COULD BE ADDED TO THE NEW ZEALAND ECONOMY if businesses made more effective use of the Internet million MOBILE PHONES ARE CONNECTED TO THE INTERNET 86 active connections for every 100 New Zealanders 3 Only 23% of boards of directors ACTIVELY PARTICIPATE IN SECURITY POLICY 2 AS A RANSOMWARE TARGET, New Zealand ranked 4th in the Asia Pacific and 21st globally with an average of 108 ransomware attacks per day 4 FOUR INTERSECTING GOALS TO ACHIEVE CYBER SECURITY CYBER RESILIENCE New Zealand s information infrastructures can resist cyber threats and we have the tools to protect our national interests CYBER CAPABILITY New Zealand businesses, and government agencies understand cyber threats and have the capability to protect themselves ADDRESSING CYBERCRIME New Zealand improves its ability to prevent, investigate and respond to cybercrime INTERNATIONAL COOPERATION New Zealand protects and advances its interests on cyberspace issues internationally 1 The Value of Internet Services to New Zealand Businesses, 31 March 2014: 2 PwC Global State of Information Security Survey 2016, October 2015: 3 Internet Service Provider Survey, October 2015: 4 Internet Security Threat Report, April 2016:

4 SUMMIT PROGRAMME 8.15AM 9.00AM Registration CYBER SECURITY SUMMIT OPENING SESSION 9.00AM 9.20AM Welcome by Paul Ash, Director of the National Cyber Policy Office, Department of the Prime Minister and Cabinet Address by the Prime Minister, Rt Hon John Key Keeping New Zealand s Economy Cyber Secure KEYNOTE SPEECHES 9.20AM 9.45AM 9.45AM 10.15AM 10.15AM 10.30AM Jim Lewis, Senior Vice President and Program Director, Center for Strategic and International Studies (CSIS) Matt Thomlinson, Vice President of Security, Microsoft Morning tea SESSION 1: WHAT S AT STAKE FOR NEW ZEALAND? UNDERSTANDING THE OPPORTUNITIES AND THREATS 10.30AM 11.15AM Achieving the vision of a secure, resilient and prosperous online New Zealand means that individuals are protected online and New Zealand s businesses can function, grow and innovate. Cyber security has the potential to be used as a point of positive, competitive advantage internationally. New Zealand s Cyber Security Strategy, December 2015 Panel discussion facilitated by Frances Valintine, Founder Tech Futures Lab; Founder and Chair of The Mind Lab by Unitec Major General (Ret) Earl D Matthews, Vice President, Enterprise Security Solutions, Hewlett Packard Enterprise Services, U.S. Public Sector Lillian Grace, Chief Executive, Figure.NZ Dr Patrick Strange, Chair Chorus; former Chief Executive Transpower Steve Glynn, Chief Information Security Officer, ANZ Bank KEYNOTE SPEECH 11.15AM 11.45AM Richard Bejtlich, Chief Security Strategist, FireEye, Non-resident Senior Fellow, The Brookings Institution MINISTERIAL ADDRESS 11.45AM MIDDAY Address by Minister for Communications, Hon Amy Adams SESSION 2: A CALL TO ACTION: MAKING NEW ZEALAND SECURE, RESILIENT AND PROSPEROUS ONLINE MIDDAY 12.45PM The government has a role to play in cyber security but not on its own. Close partnerships with the private sector and non-government organisations are required. Businesses drive the New Zealand economy and depend on the Internet and networked technology. They must protect the information that is critical to their commercial success. The private sector owns and operates the telecommunications systems. The private sector and technical community also have considerable cyber security expertise. New Zealand s Cyber Security Strategy, December 2015 Panel discussion facilitated by Frances Valintine, Founder Tech Futures Lab; Founder and Chair of The Mind Lab by Unitec Dr Rick Ede, Chief Executive, Unitec Institute of Technology Jo Healey, Chief Executive, Dimension Data Major General Stephen Day, former head of the Australian Cyber Security Centre Rick Shera, Partner Lowndes Jordan (IT/IP specialist); Chair of NetSafe; Director, Network for Learning SESSION 3: WHAT ARE THE ODDS OF GETTING HACKED? 12.45PM 1.00PM 1.00PM 1.45PM John Allen, Chief Executive, NZ Racing Board Networking lunch

5 #CYBERNZ16 SESSION 4: SUMMING UP THE KEY ISSUES FOR NEW ZEALAND 1.45PM 2.30PM Paul Ash, Director of the National Cyber Policy Office, Department of the Prime Minister and Cabinet, welcomes participants to the afternoon sessions The panel sums up the key messages from the morning s discussions. Richard Salgado, Global Director of Information Security, Google David Havercroft, Chief Operating Officer, Spark Kendra Ross, Co-Founder, Duo NZ, 1stTuesday and isanz Jordan Carter, Chief Executive, Internet NZ Toby Gee, Special Counsel, Minter Ellison Tony Wilson, Head of Information Security, BNZ WORKSHOPS 1 & PM 3.15PM 3.15PM 3.30PM WORKSHOPS 3 & PM 4.15PM WORKSHOP 1: CLOSING THE CYBER SECURITY SKILLS GAP New Zealand s cyber security expertise needs to grow so that businesses and organisations can source the technical staff required to carry out ICT security. At the same time, the education and training system should produce ICT users at all levels with the skills to put in place basic cyber hygiene practices. Facilitator: David Eaton, Chief Technology Officer (NZ), Hewlett Packard Enterprise (NZ) Afternoon tea WORKSHOP 3: MAKING A DIFFERENCE TO THE CYBER SECURITY OF SMALL BUSINESSES Small and medium enterprises (SMEs) play a huge role in New Zealand s economic growth; it is important that they are equipped to protect their business information... A new cyber credentials scheme is proposed for SMEs. The scheme will promote to the SME audience the core actions that, if implemented properly, can make a big difference to their cyber security. Facilitator: Ken Wallace, New Zealand practice leader for Technology Risk and Assurance, EY Introductory comments: Minister for Small Business, Hon Craig Foss WORKSHOP 2: BUILDING A CERT It is proposed that a national CERT be established. This institution would act as a central reporting mechanism for the full range of cyber incidents, triaging incident response to the relevant separate organisation and ensuring technical advice gets to the organisations that need it in real-time. Facilitator: Kirk Hope, Chief Executive, Business New Zealand WORKSHOP 4: CONNECTING SMART AND PREVENTING CYBERCRIME Achieving [the Cyber Capability] goal means that New Zealanders at all levels will have the skills and tools to protect themselves online, making it harder for malicious cyber actors to steal private data, identity information or cause damage to information systems. Prevention first is at the heart of our approach to cybercrime giving New Zealanders the tools to change their online behaviour. Facilitator: Kevin McDonald, Chief Risk Officer, ASB WRAP-UP: KEY OUTCOMES FROM THE FOUR WORKSHOPS 4.15PM 5.00PM 5.00PM 6.30PM The four facilitators sum up the key messages from the workshops. David Eaton, Chief Technology Officer (NZ), Hewlett Packard Enterprise (NZ) Kirk Hope, Chief Executive, Business New Zealand Ken Wallace, New Zealand practice leader for Technology Risk and Assurance, EY Kevin McDonald, Chief Risk Officer, ASB Networking drinks

6 INTERNATIONAL KEYNOTE SPEAKERS Jim Lewis SENIOR VICE PRESIDENT AND PROGRAM DIRECTOR, CENTER FOR STRATEGIC AND INTERNATIONAL STUDIES Matt Thomlinson GLOBAL VICE-PRESIDENT OF SECURITY, MICROSOFT Richard Bejtlich CHIEF SECURITY STRATEGIST, FIREEYE Jim Lewis is an acknowledged international expert and researcher on cyber security. He is currently a Senior Fellow and Program Director at the Center for Strategic and International Studies (CSIS) and directs its Technology Programme. Before joining CSIS, he worked at the Departments of State and Commerce as a Foreign Service Officer and as a member of the Senior Executive Service. His government experience includes work on politico-military assignments. He helped to develop initial US policies for Internet security and encryption. Since moving to CSIS, Lewis has authored more than 100 publications. His recent work focuses on cybersecurity, including Securing Cyberspace for the 44th Presidency, the best-selling report whose contributions to US policy were publically recognised by the White House. Lewis current research examines Internet sovereignty, cybersecurity, warfare, strategy, and technological change. He received his Ph.D. from the University of Chicago. Matt Thomlinson is Vice President, Cloud and Enterprise Security. He leads the organization responsible for Microsoft s security response, innovative security solutions for customer protection, and cyber threat intelligence. Matt s career spans more than 20 years at Microsoft where he has contributed to a number of security technologies. He is a 5-year board member and former chairman of NIST s Information Security & Privacy Advisory Board (ISPAB). In 2014, Matt was recognized as a Federal 100 winner for his work to secure the US federal government, and a 2015 Computerworld Premier 100 IT Leader. He is the inventor or co-inventor of over 20 patents on technologies ranging from secure secret storage and random number generators, to various vulnerability mitigation techniques. He holds both Master s and Bachelor s degrees in Electrical Engineering from the University of Washington. Richard Bejtlich is Chief Security Strategist at FireEye, and was Mandiant s Chief Security Officer when FireEye acquired Mandiant in He is a non-resident senior fellow at the Brookings Institution and an advisor to Threat Stack, Sqrrl, and Critical Stack. Richard was previously Director of Incident Response for General Electric, where he built and led the 40-member GE Computer Incident Response Team (GE-CIRT). Richard began his digital security career as a military intelligence officer in 1997 at the Air Force Computer Emergency Response Team (AFCERT), Air Force Information Warfare Center (AFIWC), and Air Intelligence Agency (AIA). Richard is a graduate of Harvard University and the United States Air Force Academy. He has a Bachelor of Science in History and a Bachelor of Science in Political Science from the United States Air Force Academy, and a Master of Public Policy from Harvard University. SPONSORS TERABYTE KILOBYTE BYTE

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity. Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy 2015 Action Plan A LIVING ACTION PLAN WITH ANNUAL REVIEWS New Zealand s Cyber Security Strategy provides a single cohesive framework to ensure that New Zealand is secure, resilient

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

Securing the Nation: Creating cyber security, resilience and readiness

Securing the Nation: Creating cyber security, resilience and readiness NZTech Developing a National Technology Strategy NZTech Developing a National Technology Strategy A Cyber-Secure New Zealand The Role of Government Procurement B R I E F I N G P A P E R Securing the Nation:

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Oversight and Government Reform Subcommittee on Information Technology

More information

40 Years of NZ-China Relations

40 Years of NZ-China Relations China Symposium 2012 40 Years of NZ-China Relations To mark the 40th Anniversary of the Establishment of New Zealand-China Diplomatic Relations Wednesday 5th September 2012, 9am-6.30pm Parliament Buildings

More information

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security

Testimony of. Before the United States House of Representatives Committee on Oversight and Government Reform And the Committee on Homeland Security Testimony of Dr. Phyllis Schneck Deputy Under Secretary for Cybersecurity and Communications National Protection and Programs Directorate United States Department of Homeland Security Before the United

More information

GOVERNANCE SYMPOSIUM 2016. Friday, 22nd April 2016

GOVERNANCE SYMPOSIUM 2016. Friday, 22nd April 2016 GOVERNANCE SYMPOSIUM 2016 Friday, 22nd April 2016 GOVERNANCE SYMPOSIUM 2016 John Ralston Chairman, AISNSW Board Friday, 22 nd April 2016 Sydney Cricket Ground, Driver Ave, Moore Park, Sydney The introduction

More information

Cyber Security in the Financial Industry

Cyber Security in the Financial Industry Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Foreign Affairs Subcommittee on Asia and the Pacific Reviewing President

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

CYBER LAW CONFERENCE CONFERENCE. May 2016. CPD hours

CYBER LAW CONFERENCE CONFERENCE. May 2016. CPD hours 7 CPD hours CONFERENCE CYBER LAW CONFERENCE May 2016 FROM THE CHAIR...in today s technological age, lawyers must at least be familiar with technology and know how it works and how to use it. This Conference

More information

Welcome and introduction Steve Perdia, General Manager Strategy and Planning, Canterbury Development Corporation

Welcome and introduction Steve Perdia, General Manager Strategy and Planning, Canterbury Development Corporation 1.00pm 1.30pm Registrations open Session One Welcome and introduction Steve Perdia, General Manager Strategy and Planning, Canterbury Development Corporation A product is just the start: Building strong

More information

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK 1 AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY 14 October 2015 OPENING ADDRESS LYNWEN CONNICK Thanks Arno, and good morning everyone. Welcome to Australian Information Security Association

More information

NEW ZEALAND S CYBER SECURITY STRATEGY

NEW ZEALAND S CYBER SECURITY STRATEGY Appendix 1 NEW ZEALAND S CYBER SECURITY STRATEGY June 2011 New Zealand Government 7 June 2011 ISBN: 978-0-478-38200-6 www.med.govt.nz/cyberstrategy MED11 Foreword from the Minister The Internet and digital

More information

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw

Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK

More information

Cyber Risk & Insurance

Cyber Risk & Insurance Cyber Risk & Insurance The Risk Managers Forum Thursday 27 November 2014 One-day conference Grange City Hotel, 8-14 Cooper s Row, London EC3N 2QB Event sponsor Headline sponsor Cyber Risk & Insurance The

More information

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism and Australia s Terrorism Insurance Scheme Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage Cyber Terrorism? 2013 cyber attacks on the websites of media companies

More information

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC

Professor Rajesh Chandra Vice-Chancellor & President UNIVERSITY OF THE SOUTH PACIFIC Business Improvement in Universities Realigning services to drive efficiency 15th & 16th June 2016, CQ Functions Melbourne Key Speakers Benefits of attending Paul Duldig Head of University Services THE

More information

Partnership prospectus

Partnership prospectus Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office

More information

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate

Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Cyber Security Operations Centre Reveal Their Secrets - Protect Our Own Defence Signals Directorate Contents Message from the Director 3 Cyber Security Operations Centre 5 Cyber Security Strategy 7 Conversation

More information

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie Developments in Security Regulation Agenda Introduction PM & C Cybersecurity Review Mandatory Data Retention Legislation Overview

More information

RUSI Cyber Security Conference 2011 Cyber Challenges for National Security

RUSI Cyber Security Conference 2011 Cyber Challenges for National Security RUSI Cyber Security Conference 2011 Cyber Challenges for National Security 15-16 November 2011 Day One: Tuesday 15 November 2011 0830 Registration 0900 Morning Keynote Address Professor Michael Clarke,

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan

More information

About Our 2015 WTA Cyber Security Speakers and Sessions

About Our 2015 WTA Cyber Security Speakers and Sessions About Our 2015 WTA Cyber Security Speakers and Sessions The constant threat of cyber security attacks is the number one concern for most businesses today. Weaknesses in networks and data security can expose

More information

think a paradigm shift

think a paradigm shift think a paradigm shift INTELLIGENCE DESIGN INNOVATIVE think is a great Australian story, head quartered in Melbourne and fast becoming the leader in innovation and a market disrupter within the e-procurement

More information

Pacific Islands Telecommunications Association

Pacific Islands Telecommunications Association Pacific Islands Telecommunications Association 8 th Fl, Dominion Hse PHONE : (679) 331 1638 PO BOX 2027, Govt Bldg FAX : (679) 330 8750 SUVA, FIJI Islands E-mail: pita@connect.com.fj www.pita.org.fj INVITATION

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow

2015 Cybersecurity Campaign. Improving Today, Protecting Tomorrow 2015 Cybersecurity Campaign Improving Today, Protecting Tomorrow THE STATE OF U.S. CYBERSECURITY: OUR NATION S ECONOMIC AND NATIONAL SECURITY ARE AT SIGNIFICANT RISK Hackers have breached the computer

More information

THINK. CLOUD VENDORS. December 9 th 2014. Level39 One Canada Square Canary Wharf London E14 5AH. Venue: Tele: www.thinkcloudvendors.

THINK. CLOUD VENDORS. December 9 th 2014. Level39 One Canada Square Canary Wharf London E14 5AH. Venue: Tele: www.thinkcloudvendors. THINK. CLOUD VENDORS December 9 th 2014 Venue: Tele: Level39 One Canada Square Canary Wharf London E14 5AH 0203 668 3600 www.thinkcloudvendors.com Day Summary 08:30-09:00 Coffee, Registration & Networking

More information

WRITTEN TESTIMONY OF

WRITTEN TESTIMONY OF WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you

More information

Business Plan 2012/13

Business Plan 2012/13 Business Plan 2012/13 Contents Introduction 3 About the NFA..4 Priorities for 2012/13 4 Resources.6 Reporting Arrangements.6 Objective 1 7 To raise the profile and awareness of fraud among individuals,

More information

Australia New Zealand Testing Board ANZTB SIGIST. Presenter: tbc. June 2009

Australia New Zealand Testing Board ANZTB SIGIST. Presenter: tbc. June 2009 ANZTB SIGIST Presenter: tbc June 2009 1 Agenda ANZTB Opening Address _ Leanne Howard (10 mins) Australian Computer Society (ACS) Membership Laurie Carmichael, ACS (15 mins) Test Recruitment what skills

More information

IT SERVICE SCIENCE A FUTURE IN. IT Service Science

IT SERVICE SCIENCE A FUTURE IN. IT Service Science IT SERVICE SCIENCE A FUTURE IN IT Service Science WHAT IS SERVICE SCIENCE? IT service means different things in different contexts. It can be a function like online shopping, the delivery of a program

More information

Our Sporting Future Preliminary Programme. Wednesday 21 st October Pre Conference Workshops. 1030-1730 REGISTRATION (Ground floor, main entrance)

Our Sporting Future Preliminary Programme. Wednesday 21 st October Pre Conference Workshops. 1030-1730 REGISTRATION (Ground floor, main entrance) 1030-1730 REGISTRATION (Ground floor, main entrance) 1200-1230 LUNCH ON ARRIVAL (Meeting Room 5 and 6 Foyer, first floor) Wednesday 21 st October Pre Conference Workshops 1230-1505 Workshops: Meeting Room

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

SCADA Security Training

SCADA Security Training SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,

More information

National Institute of Standards and Technology Smart Grid Cybersecurity

National Institute of Standards and Technology Smart Grid Cybersecurity National Institute of Standards and Technology Smart Grid Cybersecurity Vicky Yan Pillitteri Advisor for Information Systems Security SGIP SGCC Chair Victoria.yan@nist.gov 1 The National Institute of Standards

More information

Introduction to Cyber Security

Introduction to Cyber Security Introduction to Cyber Security Hossein Sarrafzadeh HoD Computing Director Cyber Security Centre CS4HS Workshop You are sitting in New Zealand s first joint research centre for cyber security Centre of

More information

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology

Testimony of Eunice Santos. House Oversight and Government Affairs Committee Subcommittee on Information Technology Testimony of Eunice Santos Before the House Oversight and Government Affairs Committee Subcommittee on Information Technology Federal Efforts to Improve Cybersecurity June 20 th, 2016 Chicago, Illinois

More information

Thank you for your very kind introduction.

Thank you for your very kind introduction. AMBASSADOR S REMARKS FOR CYBER SECURITY CONFERENCE ( NATIONAL SECURITY IN THE INFORMATION AGE ) AZERBAIJAN DIPLOMATIC ACADEMY (ADA) UNIVERSITY APRIL 13, 2015 AT 9:30AM Thank you for your very kind introduction.

More information

National Initiative for Cyber Security Education

National Initiative for Cyber Security Education 2014/PPWE/SEM2/007 Agenda Item: 5 National Initiative for Cyber Security Education Submitted by: United States Women Business and Smart Technology Seminar Beijing, China 23 May 2014 NICE OVERVIEW Women

More information

Connect Smart for Business SME TOOLKIT

Connect Smart for Business SME TOOLKIT Protect yourself online Connect Smart for Business SME TOOLKIT WELCOME To the Connect Smart for Business: SME Toolkit The innovation of small and medium sized enterprises (SMEs) is a major factor in New

More information

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION

E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION 1. Introduction E-SECURITY REVIEW 2008 DISCUSSION PAPER FOR PUBLIC CONSULTATION Australia s national security and economic and social well-being rely upon the use and availability of a range of Information

More information

SECURING PAYMENTS IN THE CYBER WORLD

SECURING PAYMENTS IN THE CYBER WORLD The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE AIIA Response 14 November 2011 INTRODUCTION The Australian Information Industry Association (AIIA) is the peak national body representing

More information

GUERNSEY CYBER SECURITY REVIEW

GUERNSEY CYBER SECURITY REVIEW GUERNSEY CYBER SECURITY REVIEW EXECUTIVE SUMMARY FOREWORD I am delighted that the States of Guernsey has completed a detailed cyber-security review which looks at government, businesses and individuals.

More information

Highlights from the Security Awareness Special Interest Group (SASIG) New Year 2014 event:

Highlights from the Security Awareness Special Interest Group (SASIG) New Year 2014 event: Highlights from the Security Awareness Special Interest Group () New Year 2014 event: Cyber security adopting a new approach to answer the Board s concerns Hosted by EY: 14th January 2014 The Security

More information

BSA GLOBAL CYBERSECURITY FRAMEWORK

BSA GLOBAL CYBERSECURITY FRAMEWORK 2010 BSA GLOBAL CYBERSECURITY FRAMEWORK BSA GLOBAL CYBERSECURITY FRAMEWORK Over the last 20 years, consumers, businesses and governments 1 around the world have moved online to conduct business, and access

More information

2015 CYBERSECURITY CAMPAIGN. Improving Today. Protecting Tomorrow. Page 1

2015 CYBERSECURITY CAMPAIGN. Improving Today. Protecting Tomorrow. Page 1 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow Page 1 2015 CYBERSECURITY CAMPAIGN Improving Today. Protecting Tomorrow JOIN THE CYBERSECURITY EDUCATION AND FRAMEWORK AWARENESS CAMPAIGN

More information

Analytics Day. By invitation only. 6 th Annual. Friday, April 29, 2016 Oklahoma State University ConocoPhillips OSU Alumni Center Stillwater, OK

Analytics Day. By invitation only. 6 th Annual. Friday, April 29, 2016 Oklahoma State University ConocoPhillips OSU Alumni Center Stillwater, OK 6 th Annual Analytics Day By invitation only Friday, April 29, 2016 Oklahoma State University ConocoPhillips OSU Alumni Center Stillwater, OK Program sponsored by SAS and the OSU Department of Marketing

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

20-21 April 2016. Beurs van Berlage, Amsterdam, The Netherlands. Netherlands-OECD Global Symposium on FINANCIAL. RESILIENCE throughout Life

20-21 April 2016. Beurs van Berlage, Amsterdam, The Netherlands. Netherlands-OECD Global Symposium on FINANCIAL. RESILIENCE throughout Life 20-21 April 2016 Beurs van Berlage, Amsterdam, The Netherlands Netherlands-OECD Global Symposium on FINANCIAL RESILIENCE throughout Life PROGRAMME 20-21 APRIL PROGRAMME APRIL 20 TH 2016 10:00-10:50 OPENING

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

AUSTRALIA S CYBER SECURITY STRATEGY. Enabling innovation, growth & prosperity

AUSTRALIA S CYBER SECURITY STRATEGY. Enabling innovation, growth & prosperity AUSTRALIA S CYBER SECURITY STRATEGY Enabling innovation, growth & prosperity Australia s Cyber Security Strategy Commonwealth of Australia 2016 ISBN 978-1-925238-61-7 Australia s Cyber Security Strategy

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

SPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF

SPEECH. Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH Visit http://www.mindef.gov.sg for more news and information about MINDEF and the SAF SPEECH BY PERMANENT SECRETARY (DEFENCE) MR CHAN YENG KIT, AT THE CYBER DEFENDERS DISCOVERY CAMP AWARDS CEREMONY

More information

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications OPERATIONAL REQUIREMENTS DOCUMENT National Cyber Security Framework and Protocol Contents for securing digital information in networked critical infrastructures and communications 1. General Description

More information

Chair. Presenters. Casey Plunket, Chapman Tripp, Auckland. Bruce Bernacchi, GE Finance and Insurance, Auckland

Chair. Presenters. Casey Plunket, Chapman Tripp, Auckland. Bruce Bernacchi, GE Finance and Insurance, Auckland Chair Casey Plunket, Chapman Tripp, Auckland Casey has extensive experience in the tax aspects of corporate acquisitions, mergers and restructurings, both on-shore and cross-border. He has advised US,

More information

Emotion, behaviour and applied psychology in diabetes education

Emotion, behaviour and applied psychology in diabetes education Emotion, behaviour and applied psychology in diabetes education ADEA Thought Leadership Lecture series supported by 1 ADEA would like to appreciate the support of our partner universities This program

More information

EU Cybersecurity: Ensuring Trust in the European Digital Economy

EU Cybersecurity: Ensuring Trust in the European Digital Economy EU Cybersecurity: Ensuring Trust in the European Digital Economy Synthesis of the FIC Breakfast-Debate 15 October 2013, Brussels With the participation of Tunne Kelam Member of the European Parliament'

More information

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the Testimony Statement for the Record Martin Casado, Senior Vice President Networking and Security Business Unit VMware, Inc. Before the U.S. House of Representatives Committee on Science, Space, and Technology

More information

SYMPOSIUM PROGRAM DAY ONE

SYMPOSIUM PROGRAM DAY ONE Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief

More information

LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference

LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference LAWTECH NZ 3 rd Annual New Zealand Law & Technology Conference 18 March, 2015 Pullman, Auckland EY s ediscovery Services offer rapidly deployable litigation support and professional Gold sponsor Proudly

More information

A social marketing approach to behaviour change

A social marketing approach to behaviour change A social marketing approach to behaviour change An e-learning course in using social marketing to change or sustain behaviour About The NSMC Established by Government in 2006, we are the centre of excellence

More information

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security

For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some

More information

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY

REPUBLIC OF MAURITIUS NATIONAL CYBER SECURITY STRATEGY REPUBLIC OF MAURITIUS 5555555555555555555555555555555555555555555555555555555555 5555555555555555555555555555555555555555555555555555555555 NATIONAL CYBER SECURITY STRATEGY 2014-2019 The time has come

More information

Chair Cabinet Committee on State Sector Reform and Expenditure Control

Chair Cabinet Committee on State Sector Reform and Expenditure Control Office of the Minister of State Services Chair Cabinet Committee on State Sector Reform and Expenditure Control REPORT OF THE GOVERNMENT CHIEF INFORMATION OFFICER ON THE REVIEW OF PUBLICLY ACCESSIBLE INFORMATION

More information

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE February 27, 2015 TO: FROM: RE: Members, Subcommittee on Oversight and Investigations Committee Majority Staff Hearing on Understanding the

More information

GEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT

GEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT GEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT INTERNATIONAL CONFERENCE ON CYBER ENGAGEMENT: ENHANCING COOPERATION ACROSS DIGITAL BORDERS Monday, April 27, 2015 8:00 a.m. 6:30

More information

Halo. NZ s leading business conferences. Business Intelligence. From

Halo. NZ s leading business conferences. Business Intelligence. From From Supporting Organisations Silver Sponsors Halo Business Intelligence NZ s leading business conferences DAY 1 19th February 8.30 Registration and coffee 9.00 Opening remarks from the Chair David Bloch,

More information

The Top Ten of Information Security - For 2015

The Top Ten of Information Security - For 2015 7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.

More information

Before the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives

Before the. Committee on Energy and Commerce Subcommittee on Communications and Technology United States House of Representatives Testimony of Fiona M. Alexander Associate Administrator, Office of International Affairs National Telecommunications and Information Administration United States Department of Commerce Before the Committee

More information

Orthodox, maverick and seriously left field. Anne-Marie Slattery (Australian Government Libraries Information Network) Is advocacy the answer?

Orthodox, maverick and seriously left field. Anne-Marie Slattery (Australian Government Libraries Information Network) Is advocacy the answer? URLs/AGLIN Seminar Advocacy for Libraries Program 28th August National Library of Australia 8:45am-9:00am 9:00am 9:15am 9:15am 10:00am 10:00am 10:30am 10:30am 11:00am 11:00am 11:30am 11:30am 12:15pm 12:15pm

More information

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy Statement of Gil Vega Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer U.S. Department of Energy Before the Subcommittee on Oversight and Investigations Committee

More information

SUMMIT PROGRAM. AIIA is on Twitter! Follow us at @AIIA_ICT and join the conversation using #AIIASummit and #IoT

SUMMIT PROGRAM. AIIA is on Twitter! Follow us at @AIIA_ICT and join the conversation using #AIIASummit and #IoT SUMMIT PROGRAM AIIA is on Twitter! Follow us at @AIIA_ICT and join the conversation using #AIIASummit and #IoT Elizabeth Vega AIIA Summit 2015: Navigating the Internet of Things Thank you for attending

More information

PROFESSIONAL SERVICES MARKETING. www.marketingcollege.com CIM PROFESSIONAL CERTIFICATE CIM PROFESSIONAL DIPLOMA CIM CHARTERED DIPLOMA

PROFESSIONAL SERVICES MARKETING. www.marketingcollege.com CIM PROFESSIONAL CERTIFICATE CIM PROFESSIONAL DIPLOMA CIM CHARTERED DIPLOMA PROFESSIONAL SERVICES MARKETING DISTANCE LEARNING COURSES AT CAMBRIDGE MARKETING COLLEGE CIM PROFESSIONAL CERTIFICATE CIM PROFESSIONAL DIPLOMA CIM CHARTERED DIPLOMA www.marketingcollege.com CIM CERTIFICATE

More information

INVITATION. Smart Grid & Cyber Security Conference

INVITATION. Smart Grid & Cyber Security Conference INVITATION Smart Grid & Cyber Security Conference 20 June 2013 Designing the Future for an Intelligent Energy Infrastructure Risk management and protection of critical infrastructure in an uncertain world

More information

THE HUMAN COMPONENT OF CYBER SECURITY

THE HUMAN COMPONENT OF CYBER SECURITY cybersecurity.thalesgroup.com.au People, with their preference to minimise their own inconvenience, their predictability, apathy and general naivety about the potential impacts of their actions, are the

More information

The National Skills Academy for IT. Cyber Security

The National Skills Academy for IT. Cyber Security The National Skills Academy for IT Cyber Security 1 WELCOME The Rt. Hon. David Blunkett welcomes employers and stakeholders from the Cyber Security Industry NATIONAL SKILLS ACADEMY for IT PLANS FOR TRAINING

More information

The Dow Chemical Company. statement for the record. David E. Kepler. before

The Dow Chemical Company. statement for the record. David E. Kepler. before The Dow Chemical Company statement for the record of David E. Kepler Chief Sustainability Officer, Chief Information Officer, Business Services and Executive Vice President before The Senate Committee

More information

His Hon Judge David Harvey, Auckland District Court. Richard Best, Richard Best Law, Best + Hancock Consortium, Wellington

His Hon Judge David Harvey, Auckland District Court. Richard Best, Richard Best Law, Best + Hancock Consortium, Wellington CHAIR His Hon Judge David Harvey, Auckland District Court Judge Harvey was appointed a District Court Judge in 1989. He has been closely involved with Information Technology initiatives involving the Judiciary

More information

Cyber attack and incident response

Cyber attack and incident response Cyber attack and incident response Private sector s perspective for public/private information sharing 6 June 2012 Octopus Conference at Strasbourg Tomohiko Yamakawa 0 Copyright 2012 NTT All rights reserved.

More information

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks

FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks F-43 FOREIGN AFFAIRS AND TRADE Australia - Cyber: Reports of Chinese cyber attacks Possible Ouestion Why has the Government not confronted China about cyber attacks including on DFAT, such as those aired

More information

Gregg Gerber. Strategic Engagement, Emerging Markets

Gregg Gerber. Strategic Engagement, Emerging Markets Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets 2 (Advanced) Persistent Targeted attacks 2010 2011 2012 Time 1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005

More information

Cyber security the facts

Cyber security the facts Cyber security the facts By Dr Carolyn Patteson, Executive Manager, CERT Australia The cyber threat is real and ever present and every business is at risk. Australia s security and intelligence agencies

More information

Tackling fraud in the charity sector Making your money count

Tackling fraud in the charity sector Making your money count Supported by Tackling fraud in the charity sector Making your money count Friday 30 October 2015 Royal College of Physicians, London A conference run by the charity sector for the charity sector About

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future

www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future www.pwc.nl/cybersecurity Cyber security Building confidence in your digital future 2015 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence

More information

Protecting Malaysia in the Connected world

Protecting Malaysia in the Connected world Protecting Malaysia in the Connected world cyber Security Company of the Year (Cybersecurity Malaysia, 2014) Most innovative information security company in Malaysia (Cybersecurity Malaysia, 2012) BAE

More information

DIGITAL DISRUPTION WHEN YOU LEAST EXPECT (OR WANT) IT

DIGITAL DISRUPTION WHEN YOU LEAST EXPECT (OR WANT) IT DIGITAL DISRUPTION WHEN YOU LEAST EXPECT (OR WANT) IT Craig Pitts Global Information Security Solutions Architect Lead Mondelez International June 2015 Introduction Who? What? Where? Craig Pitts Career

More information

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector

Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector Cybersecurity in the Digital Economy Challenges and Threats to the Financial Services Sector 15 April 2015, Brussels Memorandum involved in cybersecurity to work on Dr Steve Purser Head of Core Operations

More information