Improving decision-making by reducing ignorance
|
|
|
- Jean Johnston
- 10 years ago
- Views:
Transcription
1 Intelligence Applications & Intelligence Led Decision Making for Security Professionals 13th European Security Conference The Hague, 2 nd April 2014 Erik de Vries, CPP & Dick Oey, MSc, CPP Intelligence. Improving decision-making by reducing ignorance ASIS EU Intellgence Led Decision Making 1
2 Before making a strategic decision 1. Do you know all you need to know? 2. what you don t know? 3. where to find what you need to know? 4. what to do with the info once you find it? ASIS EU Introduction Erik de Vries, CPP ASIS EU Intellgence Led Decision Making 2
3 Introduction Dick Oey, MSc CPP CCIA ASIS EU Preferred outcome ASIS EU Intellgence Led Decision Making 3
4 ASIS EU Agenda Introduction Threats Security Domains Triple A Knowledge Cycle Practical cases Better and worse cases Q & A Discussion ASIS EU Intellgence Led Decision Making 4
5 Do you know all you kneed to know? 20 th Century vs. 21 st Century Tangible, linear, comprehensible Analog, singular, deterministic Mechanistic, logical, simple Not easy Manageable CHANCE X EFFECT Known knowns & Known unknowns What don t you know? 20 th Century vs. 21 st Century Networked, Adaptive, Creative, Positive Pro-Active, Holistic, Engaged, Social Sustainable, Responsible, Constructive Multi-Dimensional Digital, Viral Unknown knowns & Unkwown unknowns ASIS EU Intellgence Led Decision Making 5
6 If you can see the invisible, you can do the impossible ASIS EU Intellgence Led Decision Making 6
7 The last Kodak moment.. Revenues $ 16 billion (1996) employees Bankruptcy 2012 Inventor of the digital camera in 1976 ASIS EU Kodak moment = Security moment? Kodak was the Google of its day; pioneering technology and innovative marketing You press the button, we do the rest 90% of film and 85% of camera sales in US Decision: No shift from film tot consumer electronics Not willing to trade 90% (film) market share for 10% in consumer electronics ASIS EU Intellgence Led Decision Making 7
8 Kodak moment = Security moment? Now what if... you want to hold on to your market share: Selling security guards hours Selling physical security measures Etc. Instead of entering into new innovative security solutions ASIS EU Threats Human gate ASIS EU Intellgence Led Decision Making 8
9 Security (management) domains People Security ICT Security Security Management Physical Security Information Security ASIS EU ASIS EU Intellgence Led Decision Making 9
10 Where to find what you need to know? You cannot escape the responsibility of tomorrow by evading it today. Abraham Lincoln ASIS EU Informed decision-making Lessons Learned From History: The Military Process Out- OODA Looping the history of planning success Doctrine IPB MDMP Operation ASIS EU Intellgence Led Decision Making 10
11 System of Systems Analysis From: Guillaume Nicaise ASIS EU st Century Business Continuity Survival in the information age requires A knowledge driven corporate decision model Knowledge management & foreknowledge Flexible & agile organization ASIS EU Intellgence Led Decision Making 11
12 Implementation: Triple A Security Intelligence Protective Intelligence Red teaming ASIS EU Actions Steps Examples Practical ASIS EU Intellgence Led Decision Making 12
13 Practical cases Crisis management exercise Euro Arabic spring WTC Next level of Foreknowledge: Tactical: Operational: Strategic: Predictive Profiling Crime Analysis Red Teaming ASIS EU Remember? 1. Do you know all you need to know? 2. what you don t know? 3. where to find what you need to know? 4. what to do with the info once you find it? ASIS EU Intellgence Led Decision Making 13
14 Top 4 actions list 1. Build a network Platform information exchange 2. Switch from Reactive to Proactive Analytical Hiërarchy 3. Demand Professional Quality Certification & Education Standards 4. Use Informed Corporate Decisionaking Aquire Foreknowledge ASIS EU Platform Information Exchange Security Intelligence Protective Intelligence Red teaming ASIS EU Intellgence Led Decision Making 14
15 Top 4 actions list 1. Build a network Platform information exchange 2. Switch from Reactive to Proactive Analytical Hiërarchy 3. Demand Professional Quality Certification & Education Standards 4. Use Informed Corporate Decisionaking Aquire Foreknowledge ASIS EU Analytical Hiërarchy Model Analytical Hierarchy Behaviour & Movements Indicator Proactive Behaviour Prediction Events / Incidents Detectability Intellgence Led Decision Making 15
16 Top 4 actions list 1. Build a network Platform information exchange 2. Switch from Reactive to Proactive Analytical Hiërarchy 3. Demand Professional Quality Certification & Education Standards 4. Use Informed Corporate Decisionaking Aquire Foreknowledge ASIS EU Certification & Education Standards Protective Intelligence / Triple A Certified Security Intelligence Professional (CSIP ) Certified Crime & Intelligence Analyst Certified Protection Professional ASIS EU Intellgence Led Decision Making 16
17 Top 4 actions list 1. Build a network Platform information exchange 2. Switch from Reactive to Proactive Analytical Hiërarchy 3. Demand Professional Quality Certification & Education Standards 4. Use Informed Corporate Decisionaking Aquire Foreknowledge ASIS EU Acquire Foreknowledge Competitor Model Knowledge Management Informed Decision Enlightened Action ASIS EU Intellgence Led Decision Making 17
18 Intelligence. Improving decision-making by reducing ignorance Reducing security is an option but only if it s a conscious decision! ASIS EU Security innovation needs: a shift from repression to prevention & Thinking out of the Box ASIS EU Intellgence Led Decision Making 18
19 Thank view?id= Erik de Vries CPP Director/Owner DutchRisk bv Chairman ASIS Benelux [email protected] HDGT Oey, MSc, CPP, CCIA Principal Consultant - Director Enigma Solutions ASIS EU ASIS EU Intellgence Led Decision Making 19
Project X Social Media or Social Crisis?
Project X Social Media or Social Crisis? ASIS EU 2013 Project X Nr. 1 Worst case scenario v Facebook 16 th birthday invitafon to friends v 25.000 accepted the invitafon v ± 5.000 showed up (in a village
Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting
Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting Release Date: Closing Date: SUBMIT THE PROPOSAL TO: Insert Name Insert Title Insert Email or Physical Address Table
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Cyber intelligence exchange in business environment : a battle for trust and data
Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building
Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente
Gaining and Maintaining Support for a SOC Jim Goddard Executive Director, Kaiser Permanente Objectives Agenda 1 Lessons learned 2 How to build interest 3 Producing tangible benefits 4 Building momentum
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
LEVERAGING OPEN SOURCE INTELLIGENCE (OSINT) TO COMBAT FRAUD
The illicit practices of diversion, theft of trade secrets, and counterfeiting pharmaceutical drugs have been estimated to be a $200 billion per year industry. Managing and identifying intellectual property
Managing the Supply Chain of the Future
Managing the Supply Chain of the Future Emeritus Professor Martin Christopher Cranfield School of Management Cranfield University Cranfield Bedford MK43 0AL United Kingdom Tel : 44 (0)1234 751122 Fax :
Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience
Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Mike O Neill Managing Director Graeme McGowan Associate Director of Cyber Security
Strengthening Intelligence and Investigations with Incident Management Software
WHITE PAPER by Brian McIlravey, CPP and Peter Ohlhausen Strengthening Intelligence and Investigations with Incident Management Software by Brian McIlravey About the Authors: Brian McIlravey, CPP, is Co-CEO
Role of Management to Drive Industry Improvement Industry Case Study. Anders Vinther, Ph.D. Vice President Quality Biologics, Genentech
Role of Management to Drive Industry Improvement Industry Case Study Anders Vinther, Ph.D. Vice President Quality Biologics, Genentech 1 ICH Q10 Section III Management Responsibility (2) A. Management
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
Reducing operational planning cycle time using BPR
Reducing operational planning cycle time using BPR Tim Grant Professor, Operational ICT & Communications Netherlands Defence Academy [email protected] tel: +31 638 193 749 1 Outline Goal: To report on-going
Should you allow your employees to bring their own technology to work?
Should you allow your employees to bring their own technology to work? August 2014 Should you allow your employees to bring their own technology to work? Known by a number of terms such as Bring Your Own
Talousjohto muutosagenttina ja informaatiotulvan tulkkina
Juha Teljo Business Intelligence Solution Executive Talousjohto muutosagenttina ja informaatiotulvan tulkkina Business Analytics software Finance needs to improve its effectiveness in order to deliver
Analytics: The Future of Security
Analytics: The Future of Security Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction: Security Analytics Usher Analytics What is Usher Analytics?
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions
Wicked yet Empowering When Disruptive Innovation and Information
Wicked yet Empowering When Disruptive Innovation and Information WHO IS WATCHING Technology CLOUD Meet. ANGELS OR DEMONS? Tingting Lin Abayomi Baiyere University of Turku, Finland @speak2ab Turun World
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
The customer experience: have customers been forgotten?
The customer experience: have customers been forgotten? In the current economic climate, keeping customers happy ought to be at the top of every company s agenda. But many managers are simply too bogged
Omnichannel Evolution & Dynamic CRM
Alessandra Cambiago Customer Base & Multichannel Banking Director CheBanca! SpA, Mediobanca Group - Italy SAS Customer Intelligence Roadshow, 24 th September 2014 Prague CheBanca! document. Circulation
Big Picture of Big Data Software Engineering With example research challenges
Big Picture of Big Data Software Engineering With example research challenges Nazim H. Madhavji, UWO, Canada Andriy Miranskyy, Ryerson U., Canada Kostas Kontogiannis, NTUA, Greece [email protected] [email protected]
4th African Insurance Distribution & Bancassurance Conference Aug 2014 Presenter: Julian Ardagh. www.e-intelligence.com
4th African Insurance Distribution & Bancassurance Conference Aug 2014 Presenter: Julian Ardagh www.e-intelligence.com 2 Agenda 1. What is Big Data? 2. Why do we need Big data? 2. 3. Which The key Data
Risk Management How to manage your brand & build business resilience to improve your bottom line
2010 RMIA Members Forum Primary focus for RMIA in 2011 Risk Management How to manage your brand & build business resilience to improve your bottom line Grant Whitehorn RMIA Chief Executive Officer CPA
Risk Management Strategy, Policy and Procedure
Risk Management Strategy, Policy and Procedure DNV Quality and Risk Forum Autumn 2013 Strategy Strategy a plan of action designed to achieve a long-term or overall aim Looks to address and confirm the
JOB DESCRIPTION. Responsible for: Purpose of the job
JOB DESCRIPTION Job Title: Division: Department/Region/Section: Location: Reports to: Responsible for: Grade: Digital Analyst Communications Digital media Headquarters Head of digital media N/A MS3 Purpose
HP Fortify application security
HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router
Vision for retail data quality. How data quality powers effective decision making in consumer goods retail
Vision for retail data quality How data quality powers effective decision making in consumer goods retail Introduction Overview Aspects of Data Quality Why measure and improve DQ? Master Data in retail
Cybersecurity: Mission integration to protect your assets
Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions
MASTER DATA MANAGEMENT BUSINESS CASE
MASTER DATA MANAGEMENT BUSINESS CASE Purpose of the Business Case: Project Name: To procure a Master Data management tool to assist the Constabulary in addressing its Change Portfolio objective of integrating
CEOP Relationship Management Strategy
Making every child child matter matter... everywhere... everywhere CEOP Relationship Management Strategy Breaking down the barriers to understanding child sexual exploitation Child Exploitation and Online
How can (SAP) Technology help implementing SmartGrids
How can (SAP) Technology help implementing SmartGrids Seinsing consultation, EC-Brussels, 28th March 2007 Dr Maher Chebbo Vice President Utilities Industry for EMEA SAP AG Chairman Demand and Metering
Establishing a business performance management ecosystem.
IBM business performance management solutions White paper Establishing a business performance management ecosystem. IBM Software Group March 2004 Page 2 Contents 2 Executive summary 3 Business performance
Making Better Decisions: Data, Big Data and You. Stacia Sherman Garr Dr. Katherine Jones Bersin & Associates ANL1
Making Better Decisions: Data, Big Data and You Stacia Sherman Garr Dr. Katherine Jones Bersin & Associates ANL1 Making Better Decisions: Data, Big Data and You Sean Dineen VP of Talent Management and
Sustainability through Business Continuity Management
Sustainability through Business Continuity Management R Vaidhyanathan (RV) MBCI,CBCP, TE BS25999, BS25999LA, BCCE, 27001LA, ITIL Practice Head for Crisis Management & BCM Continuity and Resilience (CORE)
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI CGI Cyber Protection & Resilience Solutions Optimized risk management and protection
Alp Services SA Rue de Montchoisy 36 1207 Geneva Switzerland 1
lp Services S Rue de Montchoisy 36 1207 Geneva Switzerland 1 Global Investigations Litigation support Fraud investigations Counterfeiting investigations Piracy Investigations Security Systems Due Diligence
JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.
JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE
IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business
How To Listen To Social Media
WHITE PAPER Turning Insight Into Action The Journey to Social Media Intelligence Turning Insight Into Action The Journey to Social Media Intelligence From Data to Decisions Social media generates an enormous
LaSorsa & Associates
Practical Training Solutions for Today's World Reality - Efficiency - Survivability LaSorsa & Associates Executive Protection Consulting & Risk Mitigation SIGN UP NOW Evasive Driving Medical Response TECHNICAL
Process-Based Business Transformation. Todd Lohr, Practice Director
Process-Based Business Transformation Todd Lohr, Practice Director Process-Based Business Transformation Business Process Management Process-Based Business Transformation Service Oriented Architecture
Utilizing Experian next generation decision management software to bring customer management to the next level of client experience and value creation
Utilizing Experian next generation decision management software to bring customer management to the next level of client experience and value creation Susan Duffy Scotiabank Robert Stone Experian Christopher
A COMPLETE APPROACH TO SECURITY
A COMPLETE APPROACH TO SECURITY HOW TO ACHEIVE AGILE SECURITY OPERATIONS THREAT WATCH Cyber threats cost the UK economy 27 billion a year 200,000 new threats are identified every day 58% of businesses
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015
EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission
The Future of Digital CX Julie Ask, VP & Principal Analyst
The Future of Digital CX Julie Ask, VP & Principal Analyst September 24, 2015 Agenda How has mobile changed consumer engagement paradigms? How are companies approaching mobile today and why do they fall
Chapter 2 A Systems Approach to Leadership Overview
Chapter 2 A Systems Approach to Leadership Overview 2.1 Introduction Developing a high performance organisation is an appropriate and achievable goal in today s business environment. High performance organisations
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Feature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
SEO 2.0 ADVANCED SEO TIPS & TECHNIQUES ABSTRACT»
2.0 ADVANCED TIPS & TECHNIQUES ABSTRACT» Savvy online marketers know that their website is a great tool for branding, content promotion and demand generation. And they realize that search engine optimization
2015 Analyst and Advisor Summit. Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist
2015 Analyst and Advisor Summit Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist Agenda Key Facts Offerings and Capabilities Case Studies When to Engage
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG
Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
A Beginner s Guide to the Google Display Network
A Beginner s Guide to the Google Display Network Read this guide and learn how to advertise on Google s Display Network, so you open up a whole new channel of traffic, leads and customers. Brought to you
Cyber Intelligence Workforce
Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives
Security Risk Management Strategy in a Mobile and Consumerised World
Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key
HOW THE INTELLIGENT ENTERPRISE DELIVERS PERFORMANCE MANAGEMENT.
HOW THE INTELLIGENT ENTERPRISE DELIVERS PERFORMANCE MANAGEMENT. HIGHER INTELLIGENCE. MANAGEMENT SUMMARY All organizations, public, private, large and small need to effectively manage business performance.
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected]
Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected] This project has received funding from the European Union s Seventh Framework Programme for research, technological development
Security and Privacy Trends 2014
2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,
Business Intelligence
WHITEPAPER Business Intelligence Solution for Clubs This whitepaper at a glance This whitepaper discusses the business value of implementing a business intelligence solution at clubs and provides a brief
Explosive Growth Is No Accident: Driving Digital Transformation in the Insurance Industry
Explosive Growth Is No Accident: Driving Digital Transformation in the Insurance Industry By Mike Sarantopoulos, SVP, Insurance Practice, NTT DATA, Inc. and David Liliedahl, VP, Life & Annuity Portfolio,
Cyber Security Solutions Integrated. Proactive. Resilient.
Cyber Security Solutions Integrated. Proactive. Resilient. Between defending against cyber attacks and ensuring mission resilience, there is one important word: HOW Cyber attacks never stop coming. Intrusions
The Zen of Data Science. Eugene Dubossarsky Chief Data Scientist Principal Founder [email protected] a1@analystfirst.
The Zen of Data Science Eugene Dubossarsky Chief Data Scientist Principal Founder [email protected] [email protected] @cargomoose Presentation Summary - Promised -Key concepts, dos and don'ts of Data
Cyber Security: from threat to opportunity
IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known
Accenture Cyber Security Transformation. October 2015
Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting
Entrepreneurship Competition Challenge. Social Media. Entrepreneurship GUIDEBOOK
Entrepreneurship Social Media Entrepreneurship Competition Challenge GUIDEBOOK The Client: Knowledge@Wharton High School (KWHS) would like your help in achieving its mission of promoting global financial
Dr Jacob Mankidy Executive Director. Pune, India. Mankidy Associates Center for HR Solutions
Dr Jacob Mankidy Executive Director Mankidy Associates, Center for HR Solutions Pune, India Presentation What is Human Capital Management Changing Business Environment Strategic HR The Road Ahead Human
Making Business Intelligence Easy. Whitepaper Measuring data quality for successful Master Data Management
Making Business Intelligence Easy Whitepaper Measuring data quality for successful Master Data Management Contents Overview... 3 What is Master Data Management?... 3 Master Data Modeling Approaches...
