Improving decision-making by reducing ignorance

Size: px
Start display at page:

Download "Improving decision-making by reducing ignorance"

Transcription

1 Intelligence Applications & Intelligence Led Decision Making for Security Professionals 13th European Security Conference The Hague, 2 nd April 2014 Erik de Vries, CPP & Dick Oey, MSc, CPP Intelligence. Improving decision-making by reducing ignorance ASIS EU Intellgence Led Decision Making 1

2 Before making a strategic decision 1. Do you know all you need to know? 2. what you don t know? 3. where to find what you need to know? 4. what to do with the info once you find it? ASIS EU Introduction Erik de Vries, CPP ASIS EU Intellgence Led Decision Making 2

3 Introduction Dick Oey, MSc CPP CCIA ASIS EU Preferred outcome ASIS EU Intellgence Led Decision Making 3

4 ASIS EU Agenda Introduction Threats Security Domains Triple A Knowledge Cycle Practical cases Better and worse cases Q & A Discussion ASIS EU Intellgence Led Decision Making 4

5 Do you know all you kneed to know? 20 th Century vs. 21 st Century Tangible, linear, comprehensible Analog, singular, deterministic Mechanistic, logical, simple Not easy Manageable CHANCE X EFFECT Known knowns & Known unknowns What don t you know? 20 th Century vs. 21 st Century Networked, Adaptive, Creative, Positive Pro-Active, Holistic, Engaged, Social Sustainable, Responsible, Constructive Multi-Dimensional Digital, Viral Unknown knowns & Unkwown unknowns ASIS EU Intellgence Led Decision Making 5

6 If you can see the invisible, you can do the impossible ASIS EU Intellgence Led Decision Making 6

7 The last Kodak moment.. Revenues $ 16 billion (1996) employees Bankruptcy 2012 Inventor of the digital camera in 1976 ASIS EU Kodak moment = Security moment? Kodak was the Google of its day; pioneering technology and innovative marketing You press the button, we do the rest 90% of film and 85% of camera sales in US Decision: No shift from film tot consumer electronics Not willing to trade 90% (film) market share for 10% in consumer electronics ASIS EU Intellgence Led Decision Making 7

8 Kodak moment = Security moment? Now what if... you want to hold on to your market share: Selling security guards hours Selling physical security measures Etc. Instead of entering into new innovative security solutions ASIS EU Threats Human gate ASIS EU Intellgence Led Decision Making 8

9 Security (management) domains People Security ICT Security Security Management Physical Security Information Security ASIS EU ASIS EU Intellgence Led Decision Making 9

10 Where to find what you need to know? You cannot escape the responsibility of tomorrow by evading it today. Abraham Lincoln ASIS EU Informed decision-making Lessons Learned From History: The Military Process Out- OODA Looping the history of planning success Doctrine IPB MDMP Operation ASIS EU Intellgence Led Decision Making 10

11 System of Systems Analysis From: Guillaume Nicaise ASIS EU st Century Business Continuity Survival in the information age requires A knowledge driven corporate decision model Knowledge management & foreknowledge Flexible & agile organization ASIS EU Intellgence Led Decision Making 11

12 Implementation: Triple A Security Intelligence Protective Intelligence Red teaming ASIS EU Actions Steps Examples Practical ASIS EU Intellgence Led Decision Making 12

13 Practical cases Crisis management exercise Euro Arabic spring WTC Next level of Foreknowledge: Tactical: Operational: Strategic: Predictive Profiling Crime Analysis Red Teaming ASIS EU Remember? 1. Do you know all you need to know? 2. what you don t know? 3. where to find what you need to know? 4. what to do with the info once you find it? ASIS EU Intellgence Led Decision Making 13

14 Top 4 actions list 1. Build a network Platform information exchange 2. Switch from Reactive to Proactive Analytical Hiërarchy 3. Demand Professional Quality Certification & Education Standards 4. Use Informed Corporate Decisionaking Aquire Foreknowledge ASIS EU Platform Information Exchange Security Intelligence Protective Intelligence Red teaming ASIS EU Intellgence Led Decision Making 14

15 Top 4 actions list 1. Build a network Platform information exchange 2. Switch from Reactive to Proactive Analytical Hiërarchy 3. Demand Professional Quality Certification & Education Standards 4. Use Informed Corporate Decisionaking Aquire Foreknowledge ASIS EU Analytical Hiërarchy Model Analytical Hierarchy Behaviour & Movements Indicator Proactive Behaviour Prediction Events / Incidents Detectability Intellgence Led Decision Making 15

16 Top 4 actions list 1. Build a network Platform information exchange 2. Switch from Reactive to Proactive Analytical Hiërarchy 3. Demand Professional Quality Certification & Education Standards 4. Use Informed Corporate Decisionaking Aquire Foreknowledge ASIS EU Certification & Education Standards Protective Intelligence / Triple A Certified Security Intelligence Professional (CSIP ) Certified Crime & Intelligence Analyst Certified Protection Professional ASIS EU Intellgence Led Decision Making 16

17 Top 4 actions list 1. Build a network Platform information exchange 2. Switch from Reactive to Proactive Analytical Hiërarchy 3. Demand Professional Quality Certification & Education Standards 4. Use Informed Corporate Decisionaking Aquire Foreknowledge ASIS EU Acquire Foreknowledge Competitor Model Knowledge Management Informed Decision Enlightened Action ASIS EU Intellgence Led Decision Making 17

18 Intelligence. Improving decision-making by reducing ignorance Reducing security is an option but only if it s a conscious decision! ASIS EU Security innovation needs: a shift from repression to prevention & Thinking out of the Box ASIS EU Intellgence Led Decision Making 18

19 Thank view?id= Erik de Vries CPP Director/Owner DutchRisk bv Chairman ASIS Benelux [email protected] HDGT Oey, MSc, CPP, CCIA Principal Consultant - Director Enigma Solutions ASIS EU ASIS EU Intellgence Led Decision Making 19

Project X Social Media or Social Crisis?

Project X Social Media or Social Crisis? Project X Social Media or Social Crisis? ASIS EU 2013 Project X Nr. 1 Worst case scenario v Facebook 16 th birthday invitafon to friends v 25.000 accepted the invitafon v ± 5.000 showed up (in a village

More information

Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting

Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting Insert Client Name Request for Proposal for Security Risk Assessment Services Consulting Release Date: Closing Date: SUBMIT THE PROPOSAL TO: Insert Name Insert Title Insert Email or Physical Address Table

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

A NEW APPROACH TO CYBER SECURITY

A NEW APPROACH TO CYBER SECURITY A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente Gaining and Maintaining Support for a SOC Jim Goddard Executive Director, Kaiser Permanente Objectives Agenda 1 Lessons learned 2 How to build interest 3 Producing tangible benefits 4 Building momentum

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

LEVERAGING OPEN SOURCE INTELLIGENCE (OSINT) TO COMBAT FRAUD

LEVERAGING OPEN SOURCE INTELLIGENCE (OSINT) TO COMBAT FRAUD The illicit practices of diversion, theft of trade secrets, and counterfeiting pharmaceutical drugs have been estimated to be a $200 billion per year industry. Managing and identifying intellectual property

More information

Managing the Supply Chain of the Future

Managing the Supply Chain of the Future Managing the Supply Chain of the Future Emeritus Professor Martin Christopher Cranfield School of Management Cranfield University Cranfield Bedford MK43 0AL United Kingdom Tel : 44 (0)1234 751122 Fax :

More information

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Mike O Neill Managing Director Graeme McGowan Associate Director of Cyber Security

More information

Strengthening Intelligence and Investigations with Incident Management Software

Strengthening Intelligence and Investigations with Incident Management Software WHITE PAPER by Brian McIlravey, CPP and Peter Ohlhausen Strengthening Intelligence and Investigations with Incident Management Software by Brian McIlravey About the Authors: Brian McIlravey, CPP, is Co-CEO

More information

Role of Management to Drive Industry Improvement Industry Case Study. Anders Vinther, Ph.D. Vice President Quality Biologics, Genentech

Role of Management to Drive Industry Improvement Industry Case Study. Anders Vinther, Ph.D. Vice President Quality Biologics, Genentech Role of Management to Drive Industry Improvement Industry Case Study Anders Vinther, Ph.D. Vice President Quality Biologics, Genentech 1 ICH Q10 Section III Management Responsibility (2) A. Management

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

Reducing operational planning cycle time using BPR

Reducing operational planning cycle time using BPR Reducing operational planning cycle time using BPR Tim Grant Professor, Operational ICT & Communications Netherlands Defence Academy [email protected] tel: +31 638 193 749 1 Outline Goal: To report on-going

More information

Should you allow your employees to bring their own technology to work?

Should you allow your employees to bring their own technology to work? Should you allow your employees to bring their own technology to work? August 2014 Should you allow your employees to bring their own technology to work? Known by a number of terms such as Bring Your Own

More information

Talousjohto muutosagenttina ja informaatiotulvan tulkkina

Talousjohto muutosagenttina ja informaatiotulvan tulkkina Juha Teljo Business Intelligence Solution Executive Talousjohto muutosagenttina ja informaatiotulvan tulkkina Business Analytics software Finance needs to improve its effectiveness in order to deliver

More information

Analytics: The Future of Security

Analytics: The Future of Security Analytics: The Future of Security Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction: Security Analytics Usher Analytics What is Usher Analytics?

More information

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute

More information

Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security

Seamus Reilly Director EY Information Security sreilly@uk.ey.com 0207 951 3179 Cyber Security Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions

More information

Wicked yet Empowering When Disruptive Innovation and Information

Wicked yet Empowering When Disruptive Innovation and Information Wicked yet Empowering When Disruptive Innovation and Information WHO IS WATCHING Technology CLOUD Meet. ANGELS OR DEMONS? Tingting Lin Abayomi Baiyere University of Turku, Finland @speak2ab Turun World

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

The customer experience: have customers been forgotten?

The customer experience: have customers been forgotten? The customer experience: have customers been forgotten? In the current economic climate, keeping customers happy ought to be at the top of every company s agenda. But many managers are simply too bogged

More information

Omnichannel Evolution & Dynamic CRM

Omnichannel Evolution & Dynamic CRM Alessandra Cambiago Customer Base & Multichannel Banking Director CheBanca! SpA, Mediobanca Group - Italy SAS Customer Intelligence Roadshow, 24 th September 2014 Prague CheBanca! document. Circulation

More information

Big Picture of Big Data Software Engineering With example research challenges

Big Picture of Big Data Software Engineering With example research challenges Big Picture of Big Data Software Engineering With example research challenges Nazim H. Madhavji, UWO, Canada Andriy Miranskyy, Ryerson U., Canada Kostas Kontogiannis, NTUA, Greece [email protected] [email protected]

More information

4th African Insurance Distribution & Bancassurance Conference Aug 2014 Presenter: Julian Ardagh. www.e-intelligence.com

4th African Insurance Distribution & Bancassurance Conference Aug 2014 Presenter: Julian Ardagh. www.e-intelligence.com 4th African Insurance Distribution & Bancassurance Conference Aug 2014 Presenter: Julian Ardagh www.e-intelligence.com 2 Agenda 1. What is Big Data? 2. Why do we need Big data? 2. 3. Which The key Data

More information

Risk Management How to manage your brand & build business resilience to improve your bottom line

Risk Management How to manage your brand & build business resilience to improve your bottom line 2010 RMIA Members Forum Primary focus for RMIA in 2011 Risk Management How to manage your brand & build business resilience to improve your bottom line Grant Whitehorn RMIA Chief Executive Officer CPA

More information

Risk Management Strategy, Policy and Procedure

Risk Management Strategy, Policy and Procedure Risk Management Strategy, Policy and Procedure DNV Quality and Risk Forum Autumn 2013 Strategy Strategy a plan of action designed to achieve a long-term or overall aim Looks to address and confirm the

More information

JOB DESCRIPTION. Responsible for: Purpose of the job

JOB DESCRIPTION. Responsible for: Purpose of the job JOB DESCRIPTION Job Title: Division: Department/Region/Section: Location: Reports to: Responsible for: Grade: Digital Analyst Communications Digital media Headquarters Head of digital media N/A MS3 Purpose

More information

HP Fortify application security

HP Fortify application security HP Fortify application security Erik Costlow Enterprise Security The problem Cyber attackers are targeting applications Networks Hardware Applications Intellectual Property Security Measures Switch/Router

More information

Vision for retail data quality. How data quality powers effective decision making in consumer goods retail

Vision for retail data quality. How data quality powers effective decision making in consumer goods retail Vision for retail data quality How data quality powers effective decision making in consumer goods retail Introduction Overview Aspects of Data Quality Why measure and improve DQ? Master Data in retail

More information

Cybersecurity: Mission integration to protect your assets

Cybersecurity: Mission integration to protect your assets Cybersecurity: Mission integration to protect your assets C Y B E R S O L U T I O N S P O L I C Y O P E R AT I O N S P E O P L E T E C H N O L O G Y M A N A G E M E N T Ready for what s next Cyber solutions

More information

MASTER DATA MANAGEMENT BUSINESS CASE

MASTER DATA MANAGEMENT BUSINESS CASE MASTER DATA MANAGEMENT BUSINESS CASE Purpose of the Business Case: Project Name: To procure a Master Data management tool to assist the Constabulary in addressing its Change Portfolio objective of integrating

More information

CEOP Relationship Management Strategy

CEOP Relationship Management Strategy Making every child child matter matter... everywhere... everywhere CEOP Relationship Management Strategy Breaking down the barriers to understanding child sexual exploitation Child Exploitation and Online

More information

How can (SAP) Technology help implementing SmartGrids

How can (SAP) Technology help implementing SmartGrids How can (SAP) Technology help implementing SmartGrids Seinsing consultation, EC-Brussels, 28th March 2007 Dr Maher Chebbo Vice President Utilities Industry for EMEA SAP AG Chairman Demand and Metering

More information

Establishing a business performance management ecosystem.

Establishing a business performance management ecosystem. IBM business performance management solutions White paper Establishing a business performance management ecosystem. IBM Software Group March 2004 Page 2 Contents 2 Executive summary 3 Business performance

More information

Making Better Decisions: Data, Big Data and You. Stacia Sherman Garr Dr. Katherine Jones Bersin & Associates ANL1

Making Better Decisions: Data, Big Data and You. Stacia Sherman Garr Dr. Katherine Jones Bersin & Associates ANL1 Making Better Decisions: Data, Big Data and You Stacia Sherman Garr Dr. Katherine Jones Bersin & Associates ANL1 Making Better Decisions: Data, Big Data and You Sean Dineen VP of Talent Management and

More information

Sustainability through Business Continuity Management

Sustainability through Business Continuity Management Sustainability through Business Continuity Management R Vaidhyanathan (RV) MBCI,CBCP, TE BS25999, BS25999LA, BCCE, 27001LA, ITIL Practice Head for Crisis Management & BCM Continuity and Resilience (CORE)

More information

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI CGI Cyber Protection & Resilience Solutions Optimized risk management and protection

More information

Alp Services SA Rue de Montchoisy 36 1207 Geneva Switzerland 1

Alp Services SA Rue de Montchoisy 36 1207 Geneva Switzerland 1 lp Services S Rue de Montchoisy 36 1207 Geneva Switzerland 1 Global Investigations Litigation support Fraud investigations Counterfeiting investigations Piracy Investigations Security Systems Due Diligence

More information

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc. JOB ANNOUNCEMENT Chief Security Officer, Cheniere Energy, Inc. Position Overview The Vice President and Chief Security Risk Officer (CSRO) reports to the Chairman, Chief Executive Officer and President

More information

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE ABSTRACT Changing regulatory requirements, increased attack surfaces and a need to more efficiently deliver access to the business

More information

How To Listen To Social Media

How To Listen To Social Media WHITE PAPER Turning Insight Into Action The Journey to Social Media Intelligence Turning Insight Into Action The Journey to Social Media Intelligence From Data to Decisions Social media generates an enormous

More information

LaSorsa & Associates

LaSorsa & Associates Practical Training Solutions for Today's World Reality - Efficiency - Survivability LaSorsa & Associates Executive Protection Consulting & Risk Mitigation SIGN UP NOW Evasive Driving Medical Response TECHNICAL

More information

Process-Based Business Transformation. Todd Lohr, Practice Director

Process-Based Business Transformation. Todd Lohr, Practice Director Process-Based Business Transformation Todd Lohr, Practice Director Process-Based Business Transformation Business Process Management Process-Based Business Transformation Service Oriented Architecture

More information

Utilizing Experian next generation decision management software to bring customer management to the next level of client experience and value creation

Utilizing Experian next generation decision management software to bring customer management to the next level of client experience and value creation Utilizing Experian next generation decision management software to bring customer management to the next level of client experience and value creation Susan Duffy Scotiabank Robert Stone Experian Christopher

More information

A COMPLETE APPROACH TO SECURITY

A COMPLETE APPROACH TO SECURITY A COMPLETE APPROACH TO SECURITY HOW TO ACHEIVE AGILE SECURITY OPERATIONS THREAT WATCH Cyber threats cost the UK economy 27 billion a year 200,000 new threats are identified every day 58% of businesses

More information

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015 Aristotelis Tzafalias Trust and Security Unit H.4 DG Connect European Commission Trust and Security: One Mission

More information

The Future of Digital CX Julie Ask, VP & Principal Analyst

The Future of Digital CX Julie Ask, VP & Principal Analyst The Future of Digital CX Julie Ask, VP & Principal Analyst September 24, 2015 Agenda How has mobile changed consumer engagement paradigms? How are companies approaching mobile today and why do they fall

More information

Chapter 2 A Systems Approach to Leadership Overview

Chapter 2 A Systems Approach to Leadership Overview Chapter 2 A Systems Approach to Leadership Overview 2.1 Introduction Developing a high performance organisation is an appropriate and achievable goal in today s business environment. High performance organisations

More information

McAfee Security Architectures for the Public Sector

McAfee Security Architectures for the Public Sector White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed

More information

Feature. Developing an Information Security and Risk Management Strategy

Feature. Developing an Information Security and Risk Management Strategy Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide

More information

SEO 2.0 ADVANCED SEO TIPS & TECHNIQUES ABSTRACT»

SEO 2.0 ADVANCED SEO TIPS & TECHNIQUES ABSTRACT» 2.0 ADVANCED TIPS & TECHNIQUES ABSTRACT» Savvy online marketers know that their website is a great tool for branding, content promotion and demand generation. And they realize that search engine optimization

More information

2015 Analyst and Advisor Summit. Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist

2015 Analyst and Advisor Summit. Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist 2015 Analyst and Advisor Summit Advanced Data Analytics Dr. Rod Fontecilla Vice President, Application Services, Chief Data Scientist Agenda Key Facts Offerings and Capabilities Case Studies When to Engage

More information

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG

Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG Using Predictive Analytics to Detect Contract Fraud, Waste, and Abuse Case Study from U.S. Postal Service OIG MACPA Government & Non Profit Conference April 26, 2013 Isaiah Goodall, Director of Business

More information

Cyber Security for SCADA/ICS Networks

Cyber Security for SCADA/ICS Networks Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And

More information

A Beginner s Guide to the Google Display Network

A Beginner s Guide to the Google Display Network A Beginner s Guide to the Google Display Network Read this guide and learn how to advertise on Google s Display Network, so you open up a whole new channel of traffic, leads and customers. Brought to you

More information

Cyber Intelligence Workforce

Cyber Intelligence Workforce Cyber Intelligence Workforce Troy Townsend Melissa Kasan Ludwick September 17, 2013 Agenda Project Background Research Methodology Findings Training and Education Project Findings Workshop Results Objectives

More information

Security Risk Management Strategy in a Mobile and Consumerised World

Security Risk Management Strategy in a Mobile and Consumerised World Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key

More information

HOW THE INTELLIGENT ENTERPRISE DELIVERS PERFORMANCE MANAGEMENT.

HOW THE INTELLIGENT ENTERPRISE DELIVERS PERFORMANCE MANAGEMENT. HOW THE INTELLIGENT ENTERPRISE DELIVERS PERFORMANCE MANAGEMENT. HIGHER INTELLIGENCE. MANAGEMENT SUMMARY All organizations, public, private, large and small need to effectively manage business performance.

More information

Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected]

Internet Governance and Cybersecurity Patrick Curry MACCSA patrick.curry@maccsa.net Internet Governance and Cybersecurity Patrick Curry MACCSA [email protected] This project has received funding from the European Union s Seventh Framework Programme for research, technological development

More information

Security and Privacy Trends 2014

Security and Privacy Trends 2014 2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,

More information

Business Intelligence

Business Intelligence WHITEPAPER Business Intelligence Solution for Clubs This whitepaper at a glance This whitepaper discusses the business value of implementing a business intelligence solution at clubs and provides a brief

More information

Explosive Growth Is No Accident: Driving Digital Transformation in the Insurance Industry

Explosive Growth Is No Accident: Driving Digital Transformation in the Insurance Industry Explosive Growth Is No Accident: Driving Digital Transformation in the Insurance Industry By Mike Sarantopoulos, SVP, Insurance Practice, NTT DATA, Inc. and David Liliedahl, VP, Life & Annuity Portfolio,

More information

Cyber Security Solutions Integrated. Proactive. Resilient.

Cyber Security Solutions Integrated. Proactive. Resilient. Cyber Security Solutions Integrated. Proactive. Resilient. Between defending against cyber attacks and ensuring mission resilience, there is one important word: HOW Cyber attacks never stop coming. Intrusions

More information

The Zen of Data Science. Eugene Dubossarsky Chief Data Scientist Principal Founder [email protected] a1@analystfirst.

The Zen of Data Science. Eugene Dubossarsky Chief Data Scientist Principal Founder eugene@contexti.com a1@analystfirst. The Zen of Data Science Eugene Dubossarsky Chief Data Scientist Principal Founder [email protected] [email protected] @cargomoose Presentation Summary - Promised -Key concepts, dos and don'ts of Data

More information

Cyber Security: from threat to opportunity

Cyber Security: from threat to opportunity IT ADVISORY Cyber Security: from threat to opportunity www.kpmg.com/nl/cybersecurity From threat to opportunity / Cyber security / 1 FOREWORD OPPORTUNITY-DRIVEN CYBER SECURITY Cyber security (also known

More information

Accenture Cyber Security Transformation. October 2015

Accenture Cyber Security Transformation. October 2015 Accenture Cyber Security Transformation October 2015 Today s Presenter Antti Ropponen, Nordic Cyber Defense Domain Lead Accenture Nordics Antti is a leading consultant in Accenture's security consulting

More information

Entrepreneurship Competition Challenge. Social Media. Entrepreneurship GUIDEBOOK

Entrepreneurship Competition Challenge. Social Media. Entrepreneurship GUIDEBOOK Entrepreneurship Social Media Entrepreneurship Competition Challenge GUIDEBOOK The Client: Knowledge@Wharton High School (KWHS) would like your help in achieving its mission of promoting global financial

More information

Dr Jacob Mankidy Executive Director. Pune, India. Mankidy Associates Center for HR Solutions

Dr Jacob Mankidy Executive Director. Pune, India. Mankidy Associates Center for HR Solutions Dr Jacob Mankidy Executive Director Mankidy Associates, Center for HR Solutions Pune, India Presentation What is Human Capital Management Changing Business Environment Strategic HR The Road Ahead Human

More information

Making Business Intelligence Easy. Whitepaper Measuring data quality for successful Master Data Management

Making Business Intelligence Easy. Whitepaper Measuring data quality for successful Master Data Management Making Business Intelligence Easy Whitepaper Measuring data quality for successful Master Data Management Contents Overview... 3 What is Master Data Management?... 3 Master Data Modeling Approaches...

More information