GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

Size: px
Start display at page:

Download "GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS"

Transcription

1 GLOBAL FORENSIC AND DISPUTE SERVICES CYBER PROTECTION SPECIALISTS

2 THE TEAM

3 William Beer São Paulo William Beer brings over 25 years of diverse international consulting experience advising on and managing cyber and information risk for large global clients. Prior to joining A&M, Mr. Beer was a Director with PwC s UK Information & Cyber Security Practice, where he helped drive the UK wide cyber and information security business. Here, Mr. Beer helped promote PwC s cyber strategy through extensive research projects and information workshops and appearances at international, large-scale events including WEF Davos, the UN-ITU and the EU Commission Security Panels. His notable clients include: Royal Bank of Scotland, UBS, Channel 4, BSkyB, UK BIS, Cassidian and WorldPay. Mr. Beer also led the UK Chapter of the Information Security Forum in London, where he oversaw an active chapter of more than 100 corporate members. Art Ehuan San Antonio Art Ehuan has extensive, high-profile industry and law enforcement experience in the field of information security. Mr. Ehuan has a specialization in strategic advisory services, including digital investigations, data protection and e-discovery for corporate and government agencies, and provides domestic and global thought leadership on these topics. Mr. Ehuan also serves as a senior lecturer on cyber crime for the U.S. State Department. Among Mr. Ehuan s high-profile corporate positions was Deputy Chief Information Security Officer for the Northrop Grumman Corporation. Mr. Ehuan was responsible for protecting data from internal and external cyber threats, developing and managing security operations and implementing a corporate digital investigative unit. Mr. Ehuan also has worldwide experience working on cases involving computer crimes. His extensive background conducting and managing computer intrusion and forensic investigations with the Federal Bureau of Investigation (FBI) led to his assignment as a Supervisory Special Agent assigned to the Computer Crimes Investigations Program at FBI Headquarters in Washington DC. Michael Gibbons Washington DC Michael Gibbons is a strategic information security specialist with over 25 years of experience on a global scale. Mr. Gibbons expertise focuses on service delivery, information protection, privacy, risk management, incident response, advisory services and governance, including compliance management. Mr. Gibbons offers a proven record of improving processes, reducing costs and mitigating risks by developing and implementing technical solutions that enable secure, reliable information sharing and computing. He expertly identifies and resolves security weaknesses to ensure regulatory compliance, and demonstrates confident leadership while working under highstress, within tight deadlines. Mr. Gibbons served a 15-year tenure at the Federal Bureau of Investigation (FBI), most recently as Special Agent, Chief of the Computer Investigations Unit, where key highlights included overseeing all cyber crime investigations for the FBI, nationally and internationally. 3

4 Wayne Grundy London Wayne Grundy has extensive international IT and e-business management and consulting experience in defence and aerospace across multiple sites, organizations and governments. Mr. Grundy is a strategic thinker with expertise in creating market opportunity using technology as an enabler, as well as building teams and leading innovative transformation and business build programmes in Cyber security, e-commerce, engineering, outsourcing, vendor management and ERP. Prior to joining A&M, Mr. Grundy was the Chief Information Officer at Raytheon UK, one of the world's largest Aerospace and Defence companies, where he co-developed Raytheon's Cyber Security business and go-to-market strategy. Tom Kellermann New York Washington DC Tom Kellerman works within Alvarez & Marsal s Global Forensic and Dispute Services practice and has over 14 years experience in Cyber Security and Data Risk Management. Prior to joining A&M, Mr. Kellermann was a Senior Vice President in Cyber Security at Trend Micro Inc., a global security software company. Here, Mr. Kellermann acted as the trusted advisor for cyber security to fortune 100 clients, where he was responsible for analysis of emerging cyber security threats and relevant defensive technologies. Mr. Kellerman was also responsible for government relations in the US and Canada, and developed strategic partnerships with Chubb and Sons Insurance; Booz Allen and CSC. Subsequent to his time with Trend Micro Inc., Mr. Kellerman was the Chief Technology Officer at AirPatrol Corp, where he was responsible for the development technical strategy of the wireless and mobility security platform and acted as trusted advisor to government agencies and financial institutions per mobile security strategies. Al Lakhani Munich New York Al Lakhani is a member of the Global Executive Committee of Alvarez & Marsal Global Forensic and Dispute Services division and serves as Practice Leader for A&M s Forensic Technology Services and Cyber Protection practices. Mr. Lakhani brings more than 17 years of experience in managing and leading complex litigation consulting and investigation assignments, and has deep expertise in the areas of data analytics (data mining and data warehousing), computer forensics and electronic discovery. Currently, Mr. Lakhani is leading a worldwide compliance review of a global manufacturing company that has acquired companies in Brazil, India and China. Based on the review, the company is embarking on a two-year project to implement internal controls and risk based monitoring for all of its subsidiaries and joint ventures around the world. Mr. Lakhani also leads the digital investigation teams responsible for both the Lehman Brothers and Washington Mutual bankruptcies. 4

5 Ed Gibson Senior Director Washington DC Ed Gibson s area of focus is on helping organizations address serious issues involving the prevention, investigation, and mitigation of, and recovery from, economic or eespionage, insider fraud, complex money laundering, cyber attacks, and intellectual property theft. Mr. Gibson s wide range of domestic and international experience is complemented by his prior corporate and federal legal experience, career as an FBI Special Agent both domestically and in a diplomatic assignment, and subsequent senior role with Microsoft Ltd in the United Kingdom (U.K.). He understands the interplay of technology and business priorities when it comes to overall business risk management strategies Prior to joining A&M, Mr. Gibson was a Director at PricewaterhouseCoopers (PwC), where he advised on business risk strategy, protecting information against internal or external compromise. Mr. Gibson was also a PwC spokesperson and figurehead for cyber security and online business risk matters. As an FBI Assistant Legal Attaché (Diplomat), American Embassy London, pre/post 9/11, Mr. Gibson was primarily responsible for all FBI cyber / online related investigations, cyber terrorism, blackmail, extortion, kidnapping, theft of intellectual property & PII, international money laundering, and transnational crimes. He worked tirelessly to establish and build relations with law local law enforcement and security services for the benefit of both countries. 5

6

Educa&onal Event Spring 2015. Cyber Security - Implications for Records Managers Art Ehuan

Educa&onal Event Spring 2015. Cyber Security - Implications for Records Managers Art Ehuan Educa&onal Event Spring 2015 Cyber Security - Implications for Records Managers Art Ehuan Risk to Corporate Information The protection of mission dependent intellectual property, or proprietary data critical

More information

Alvarez & Marsal Global Forensic and Dispute Services. 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015

Alvarez & Marsal Global Forensic and Dispute Services. 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015 Alvarez & Marsal Global Forensic and Dispute Services 2015 Asia Pacific Regional Meeting (APRM) Tokyo, Japan 23-25 April 2015 A&M OVERVIEW GLOBAL REACH NEW YORK (GLOBAL HQ) LONDON (EUROPE HQ) HONG KONG

More information

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services

www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse PwC Finland Forensic Services www.pwc.fi We believe successful global organisations can confront fraud, corruption and abuse Finland Who are we? Bring a robust forensics team to the table to support your organisation Our practice can

More information

CyberSecurity Solutions. Delivering

CyberSecurity Solutions. Delivering CyberSecurity Solutions Delivering Confidence Staying One Step Ahead Cyber attacks pose a real and growing threat to nations, corporations and individuals globally. As a trusted leader in cyber solutions

More information

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Keynote: FBI Wednesday, February 4 noon 1:10 p.m. Speaker: Leo Taddeo Special Agent in Change, Cyber/Special Operations Division Federal Bureau of Investigation Biography: Leo Taddeo Leo Taddeo is the

More information

CYBER RISK SECURITY, NETWORK & PRIVACY

CYBER RISK SECURITY, NETWORK & PRIVACY CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread

More information

Report on CAP Cybersecurity November 5, 2015

Report on CAP Cybersecurity November 5, 2015 Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets

More information

Corporations Take Control of E-Discovery

Corporations Take Control of E-Discovery Guidance Software Whitepaper Corporations Take Control of E-Discovery Chris Dale edisclosure Information Project What Does Your In-House E-Discovery Look Like? 53% indicate a GROWING CASE LOAD 55 % review

More information

Cyber Insurance as one element of the Cyber risk management strategy

Cyber Insurance as one element of the Cyber risk management strategy Cyber Insurance as one element of the Cyber risk management strategy Stéphane Hurtaud Partner Governance, Risk & Compliance Thierry Flamand Partner Insurance Leader Laurent de la Vaissière Director Governance,

More information

Rogers Insurance Client Presentation

Rogers Insurance Client Presentation Rogers Insurance Client Presentation Network Security and Privacy Breach Insurance Presented by Matthew Davies Director Professional, Media & Cyber Liability Chubb Insurance Company of Canada mdavies@chubb.com

More information

Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015

Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report. November 23, 2015 Standing together for financial industry cyber resilience Quantum Dawn 3 after-action report November 23, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario

More information

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM

WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM WILLIAM OETTINGER PHONE (702) 292-4645 WOETTINGER@GMAIL.COM SUMMARY OF QUALIFICATIONS Veteran investigator in a traditional and computer-related environment. A leader experienced in organizing, directing,

More information

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft Cyber Security and Privacy Services Working in partnership with you to protect your organisation from cyber security threats and data theft 2 Cyber Security and Privacy Services What drives your security

More information

DONALD F. CONWAY, CPA, Managing Director, The Mercadien Group

DONALD F. CONWAY, CPA, Managing Director, The Mercadien Group DONALD F. CONWAY, CPA, Managing Director, The Mercadien Group Donald F. Conway, CPA, is a principal in Mercadien, P.C., a CPA firm with a multi-disciplined consulting practice. Mr. Conway specializes in

More information

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580

Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 Dr. Starnes E. Walker Founding Director, Cybersecurity Initiative starnes@udel.edu (302) 831 1580 The Cybersecurity Initiative was established at the University of Delaware in 2014 as an integrated learning

More information

Cyber/ Network Security. FINEX Global

Cyber/ Network Security. FINEX Global Cyber/ Network Security FINEX Global ABOUT US >> We are one of the largest insurance brokers in the world >> We have over 180 years of history and experience in insurance; we currently operate in over

More information

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations

Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations TeleContinuity The Survivable Cyber Solution Presentation For Presenter: October 14, 2009 Mr. Takanobu Ito Managing Director, Asia Pacific & Middle East Operations 2007 TeleContinuity, Inc.. All Rights

More information

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Investment in cyber insurance Lockton Companies

More information

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President

More information

Alvarez & Marsal Global Forensic and Dispute Services. Americas Regional Meeting Montreal, QC, Canada 25-27 June 2015

Alvarez & Marsal Global Forensic and Dispute Services. Americas Regional Meeting Montreal, QC, Canada 25-27 June 2015 Alvarez & Marsal Global Forensic and Dispute Services Americas Regional Meeting Montreal, QC, Canada 25-27 June 2015 A&M OVERVIEW GLOBAL REACH NEW YORK (GLOBAL HQ) LONDON (EUROPE HQ) HONG KONG (ASIA HQ)

More information

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA

Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Ernesto F. Rojas CISSP, DFCP, IAM, IEM, DABRI, PSC, MBA Mr. Rojas has over 25 years of information systems consulting, supervisory, managerial and executive experience in various industries. He is considered

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

www.pwc.com/us/cyber Statement of Qualifications Cybercrime & data breach

www.pwc.com/us/cyber Statement of Qualifications Cybercrime & data breach www.pwc.com/us/cyber Statement of Qualifications Cybercrime & data breach Contents Countering cyber threats and fraud Cyber forensics and investigative services Cyber forensics and investigations Past

More information

CYBER-ATTACKS THE GLOBAL RESPONSE

CYBER-ATTACKS THE GLOBAL RESPONSE R E P R I N T CYBER-ATTACKS THE GLOBAL RESPONSE REPRINTED FROM: Risk, Governance & Compliance for Financial Institutions 2015 RISK GOVERNANCE & COMPLIANCE for F I N A N C I A L INSTITUTIONS 2 0 1 5 Visit

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

VIRGINIA CYBER SECURITY COMMISSION November 7, 2014

VIRGINIA CYBER SECURITY COMMISSION November 7, 2014 VIRGINIA CYBER SECURITY COMMISSION November 7, 2014 1 Mission Statement The mission of the Virginia Cyber Security Partnership is to establish and maintain a trusted community of public and private sector

More information

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats;

understanding and managing enterprise risk; evaluating organizational structure and communications; assessing and handling insider threats; GermanoLawLLC provides client- focused counsel and assistance regarding cybersecurity and data privacy concerns. We help companies understand, prepare for and address internal and external cybersecurity

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical

More information

The Risks Of Dealing With Email leak

The Risks Of Dealing With Email leak MANAGING CYBER RISK: WHO HAS YOUR INFORMATION? Contributing authors Tom Lawton Donna Goddard Edward P Gibson STATEMENT OF INTENT Corporate treasurers must consider the cyber risks associated with many

More information

HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES?

HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES? HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES? MODERATOR: Richard J. Bortnick, Esq., Defense Attorney, Cozen O Connor PANELISTS: Anjali Das, MBA, Esq., Partner, Wilson Elser Moskowitz

More information

How to Prepare for a Data Breach

How to Prepare for a Data Breach IT Forum How to Prepare for a Data Breach Expediting Response and Minimizing Losses Presentation for SURA IT Committee November 5,,2014 Laura Whitaker, Senior Research Director eab.com Getting to Know

More information

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures

More information

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC

CURRICULUM VITAE. David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC CURRICULUM VITAE David T. Gallant (USAF Retired) President, Gallant Computer Investigative Services, LLC EDUCATION: Bachelor of Science, University of the State of New York, Albany, NY, 1995 AA, Criminal

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

The FBI and the Internet

The FBI and the Internet The FBI and the Internet Special Agent Robert Flaim Federal Bureau of Investigation Presentation Goals To give you a better understanding of: The FBI Cyber Division, its priorities, and its mission The

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

FINAL // FOR OFFICIAL USE ONLY. William Noonan

FINAL // FOR OFFICIAL USE ONLY. William Noonan FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States

More information

Cyber Governance Health Check Cyber security survey for top segment of Dutch market

Cyber Governance Health Check Cyber security survey for top segment of Dutch market www.pwc.nl Cyber Governance Health Check Cyber security survey for top segment of Dutch market PwC The Netherlands May 2014 Contents Introduction Executive Summary Detailed results Part 1: Overview of

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

PREPARE YOUR INCIDENT RESPONSE TEAM

PREPARE YOUR INCIDENT RESPONSE TEAM PREPARE YOUR INCIDENT RESPONSE TEAM JUNE 2015 Michael Harrington, Fidelis Cybersecurity It s a big problem... The ongoing cyber-thefts from The scale of international theft the In networks 2013, the of

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Keith Barger MFS, MCSE, CCE

Keith Barger MFS, MCSE, CCE Keith Barger MFS, MCSE, CCE Principal/Practice Leader Advisory Services Keith Barger is a Principal in the Advisory Services practice with Grant Thornton and the Practice Leader for Forensic Accounting

More information

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity: Protecting Your Business. March 11, 2015 Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks

More information

THE WORLD IS MOVING FAST, SECURITY FASTER.

THE WORLD IS MOVING FAST, SECURITY FASTER. THE WORLD IS MOVING FAST, SECURITY FASTER. * COMMITTED TO SECURITY* *Committed to providing peace of mind in your digital life and business. [ 3 ] OUR MISSION TO PREVENT AND MANAGE RISKS FACED BY ORGANIZATIONS

More information

MAJOR EVENTS COORDINATION UNIT

MAJOR EVENTS COORDINATION UNIT 1 UNITED STATES DEPARTMENT OF STATE BUREAU OF DIPLOMATIC SECURITY MAJOR EVENTS COORDINATION UNIT 2 1 THE BUREAU OF DIPLOMATIC SECURITY (DS) IS THE SECURITY AND LAW ENFORCEMENT ARM OF THE U.S. DEPARTMENT

More information

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf

GRC/Cyber Insurance. February 18, 2014. Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London. Join the conversation: #ISSAWebConf GRC/Cyber Insurance February 18, 2014 Start Time: 9 AM US Pacific, Noon US Eastern, 5 pm London Join the conversation: 1 Generously sponsored by: 2 Welcome Conference Moderator Allan Wall ISSA Web Conference

More information

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1 Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta,

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Keeping watch over your best business interests.

Keeping watch over your best business interests. Keeping watch over your best business interests. 0101010 1010101 0101010 1010101 IT Security Services Regulatory Compliance Services IT Audit Services Forensic Services Risk Management Services Attestation

More information

FTI Consulting insurance services

FTI Consulting insurance services INSURANCE SERVICES FTI Consulting insurance services The insurance industry is operating in a complex and dynamic global environment. Low interest rates, the demand on capital and ever-changing regulation

More information

LINA TERMANINI. Work Experience:

LINA TERMANINI. Work Experience: LINA TERMANINI Professional Summary: Worked with clients to tackle challenges in performance, technology, risk and compliance: IT Advisory: extensive experience in program management, Program Management

More information

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations

More information

Whether you are a practising

Whether you are a practising Introduction By the end of the programme, you will have a specialised knowledge of international business law that reflects the changing commercial, social, political and technical realities of the global

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

The Global Cyber Security Market 2015-2025

The Global Cyber Security Market 2015-2025 Brochure More information from http://www.researchandmarkets.com/reports/3502775/ The Global Cyber Security Market 2015-2025 Description: Summary During the forecast period the demand for cyber security

More information

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS 2014 - Data Breach : The Emerging Threat to Healthcare Industry DATA BREACH A FICTIONAL CASE STUDY THE FIRST SIGNS OF TROUBLE Friday, 5.20 pm :

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

www.pwc.co.uk Cyber security Building confidence in your digital future

www.pwc.co.uk Cyber security Building confidence in your digital future www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in

More information

Making Sense of Cyber Insurance: A Guide for SMEs

Making Sense of Cyber Insurance: A Guide for SMEs Making Sense of Cyber Insurance: A Guide for SMEs abi.org.uk @BritishInsurers 2 abi.org.uk Contents Introduction 4 Six Key Areas to Look Out For in Cyber Insurance Policies 5 Potential Exclusions to Look

More information

UK Permanent Salary Index - 2015

UK Permanent Salary Index - 2015 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 2013 2014 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation responsible

More information

CGI Cyber Risk Advisory and Management Services for Insurers

CGI Cyber Risk Advisory and Management Services for Insurers CGI Cyber Risk Advisory and Management Services for Insurers Minimizing Cyber Risks cgi.com 3 As organizations seek to create value in today s highly interconnected world, they inherently increase their

More information

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group Cyber Security Breakout Session Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group December 2014 Disclaimer: The material in this presentation

More information

Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from

Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from Robert A. Bauerschmidt graduated cum laude from The University of Illinois College of Law in May, 1990 and received his Bachelor of Arts Degree from The University of Michigan in May, 1987. In 1990, he

More information

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure.

MARYLAND. Cyber Security White Paper. Defining the Role of State Government to Secure Maryland s Cyber Infrastructure. MARYLAND Cyber Security White Paper Defining the Role of State Government to Secure Maryland s Cyber Infrastructure November 1, 2006 Robert L. Ehrlich, Jr., Governor Michael S. Steele, Lt. Governor Message

More information

(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing

(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing FEDERAL BUREAU OF INVESTIGATION INTELLIGENCE BULLETIN Cyber Intelligence Section 2 August 2011 (U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing (U//FOUO) The FBI assesses with

More information

Bank Secrecy Act Conference

Bank Secrecy Act Conference 2014 Bank Secrecy Act Conference Sponsored by: AGENDA 9:00 a.m. - 10:00 a.m. 10:15 a.m. - 11:45 a.m. 11:45 a.m. - 1:15 p.m. 1:15 p.m. - 2:15 p.m. 2:30 p.m. - 3:30 p.m. 3:45 p.m. - 4:45 p.m. Thursday, June

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

e-discovery Forensics Incident Response

e-discovery Forensics Incident Response e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:

More information

Commercial Mortgage Asset Management, Workout & Loan Restructuring Services

Commercial Mortgage Asset Management, Workout & Loan Restructuring Services Commercial Mortgage Asset Management, Workout & Loan Restructuring Services Lowers & Associates (L&A) provides commercial mortgage asset management and workout solutions to financial institutions nationwide.

More information

The Top Ten of Information Security - For 2015

The Top Ten of Information Security - For 2015 7 th Annual Information Security Summit The Executive Forum Information Security Management Overview June 4, 2015 Copyright 2015. Citadel Information Group. All Rights Reserved. 2 Establishing Leadership.

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations

More information

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS

CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS CRITICAL THINKING AT THE CRITICAL TIME CONSTRUCTION SOLUTIONS Table of Contents 1 ABOUT FTI CONSULTING 2 CHALLENGES OVERCOME 3 OUR EXPERTISE 4 PROJECT TYPES 5 OUR TEAM ii FTI Consulting, Inc. CONSTRUCTION

More information

The Cancer Running Through IT Cybercrime and Information Security

The Cancer Running Through IT Cybercrime and Information Security WHITE PAPER The Cancer Running Through IT Prepared by: Richard Brown, Senior Service Management Consultant Steve Ingall, Head of Consultancy 60 Lombard Street London EC3V 9EA T: +44 (0)207 464 8883 E:

More information

Effective Protocols for Reducing Electronic Discovery Costs

Effective Protocols for Reducing Electronic Discovery Costs Effective Protocols for Reducing Electronic Discovery Costs New Jersey Corporate Counsel Association September 21, 2012 Judge Patty Shwartz James Anelli Brian Halpin William Belt William Johnson Overview

More information

PROPOSED INTERPRETIVE NOTICE

PROPOSED INTERPRETIVE NOTICE August 28, 2015 Via Federal Express Mr. Christopher J. Kirkpatrick Secretary Office of the Secretariat Commodity Futures Trading Commission Three Lafayette Centre 1155 21st Street, N.W. Washington, DC

More information

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION

RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former

More information

FBI AND CYBER SECURITY

FBI AND CYBER SECURITY FBI AND CYBER SECURITY SSA John Caruthers SSA Ken Schmutz SSA Tom Winterhalter Mission The FBI is the only U.S. agency charged with the authority to investigate both criminal and national security investigations.

More information

How To Protect Your It Infrastructure

How To Protect Your It Infrastructure Proactive Real-Time Monitoring and Risk Management Managed Security Services NCS Group Offices Australia Bahrain Brunei China Dubai Hong Kong SAR Korea Malaysia Philippines Singapore Sri Lanka Understanding

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

RUAG Cyber Security. More security for your data

RUAG Cyber Security. More security for your data RUAG Cyber Security More security for your data More security in cyberspace The RUAG Cyber Security Portfolio offers greater protection for your data through inspection, event analysis and decision-making

More information

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril. Cyber Security Personal and commercial information is the new commodity of choice for the virtual thief, argues Adrian Leppard, Commissioner for City of London Police, as he sets out the challenges facing

More information

SUFFOLK COASTAL DISTRICT COUNCIL DOMESTIC FLOOD PROTECTION POLICY

SUFFOLK COASTAL DISTRICT COUNCIL DOMESTIC FLOOD PROTECTION POLICY SUFFOLK COASTAL DISTRICT COUNCIL DOMESTIC FLOOD PROTECTION POLICY 1. Introduction 1.1 The Council recognises the threat to local communities from flooding following severe weather events and as a result

More information

Physical Security Services

Physical Security Services Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,

More information

Outsourcing Technology Services A Management Decision

Outsourcing Technology Services A Management Decision Outsourcing Technology Services A Management Decision A Telephone Seminar for National Banks Tuesday, July 20, 2004 And again on Wednesday, July 21, 2004 Agenda Outsourcing activities and relationships

More information

Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc.

Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc. Prepared testimony of W. Joseph Majka Head of Fraud Control and Investigations Visa Inc. Before the Subcommittee on Emerging Threats, Cybersecurity, and Science and Technology of the House Committee on

More information

Director IPR Policy and Programs U.S. Customs and Border Protection

Director IPR Policy and Programs U.S. Customs and Border Protection Therese Randazzo Director IPR Policy and Programs Therese Randazzo is the Director, IPR Policy and Programs with U.S. Customs and Border Protection (CBP). Ms. Randazzo directs CBP policies and program

More information

Into the cybersecurity breach

Into the cybersecurity breach Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing

More information

Data Privacy, Security, and Risk Management in the Cloud

Data Privacy, Security, and Risk Management in the Cloud Data Privacy, Security, and Risk Management in the Cloud Diana S. Hare, Associate General Counsel and Chief Privacy Counsel, Drexel University David W. Opderbeck, Counsel, Gibbons P.C. Robin Rosenberg,

More information

Announcing a new investment in Latin America

Announcing a new investment in Latin America BT Global Services Announcing a new investment in Latin America October 2011 BT Global Services BT a global leader in networked IT services Introduction Jeff Kelly CEO 2 Introduction BT, an introduction

More information

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President

September 28, 2 012 MEMORANDUM FOR. MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President 004216 THE WHITE HOUSE WASHINGTON MEMORANDUM FOR September 28, 2 012 MR. ANTONY BLINKEN Deputy Assistant to the President and National Security Advisor to the Vice President MR. STEPHEN D. MULL Executive

More information

Global Cyber Security Market Forecast and Opportunities, 2020

Global Cyber Security Market Forecast and Opportunities, 2020 Brochure More information from http://www.researchandmarkets.com/reports/3232007/ Global Cyber Security Market Forecast and Opportunities, 2020 Description: According to Global Cyber Security Market Forecast

More information

National Cybersecurity & Communications Integration Center (NCCIC)

National Cybersecurity & Communications Integration Center (NCCIC) National Cybersecurity & Communications Integration Center (NCCIC) FOR OFFICIAL USE ONLY NCCIC Overview NCCIC Overview The National Cybersecurity and Communications Integration Center (NCCIC), a division

More information

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation

More information