Cyber Security in the Financial Industry
|
|
|
- Kelley Brown
- 10 years ago
- Views:
Transcription
1 Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today s cyber threat is a very real and persistent one. Cyber-attacks are growing ever more sophisticated, and the landscape is becoming increasingly complex. As cyber criminals become better organised and funded, there are also state actors focussing both on snooping and disruption. Cyber security is the issue that keeps most CEOs awake at night, not least of which in the financial industry. Cyber threats to the financial industry are not only external, but also internal. Amongst all reported cybercrimes, those committed by malicious insiders in financial services are amongst the most significant threats to networked systems and data. Financial institutions face the ongoing challenge of securing legacy systems that are linked together in an often less than ideal way. Online banking has become commonplace, whilst new digital currencies are regularly appearing (but little understood). In the post-snowden world, cyber security has never been more crucial. At a country and regional level cyber security is taking centre stage (e.g. the European Union s Cyber Security Strategy). In the world of cryptography, new developments are appearing aimed at protecting your data. What more can and should be done? What do you need to do to protect your financial institution? In this one day event you will hear from and have the opportunity to engage with leading cyber academics and experts from the financial and technology industries as well as those involved in law enforcement. We will end the day with a cocktail, and for those interested in playing, a role-play board game designed to increase awareness of cyber-security risks and the measures you can take to protect your company. We look forward to seeing you in Belgium in November. Peter Ware Director, SWIFT Institute Professor Bart Preneel Department of Electrical Engineering- ESAT/COSIC (Computer Security and Industrial Cryptography) KU Leuven Date: 19 November 2014 Venue: Chateau du Lac, Avenue du Lac 87, B-1332 Genval (Brussels), Belgium Register Now! Page: 1
2 Agenda 08:30 09:00 Welcome Coffee & Registration 09:00 09:15 Welcome Address Gottfried Leibbrandt, Chief Executive Officer, SWIFT and Advisory Council Member, SWIFT Institute Keynote Speech - Mitigating the Insider Threat to the Financial Industry Chris Hurran will discuss insider threats to the financial industry, looking at both malicious and non-malicious threats, and beyond. Whilst today s cyber threats are ever increasing, there is light at the end of the tunnel. Chris will share practices and methods by which these threats can be mitigated. 09:15 10:00 Chris Hurran is a Senior Associate Fellow at University College London. He was awarded the Order of the British Empire (OBE) as a result of his more than 45 years of public service in the British Royal Engineers, the Diplomatic Service, NISCC (National Infrastructure Security Coordination Centre) and CPNI (Centre for the Protection of National Infrastructure). In NISCC Chris led all aspects of contingency and crisis management planning. In CPNI he was responsible for the delivery of research based guidance and tools on personnel security issues. He has particular expertise in counterproductive workplace behaviour, organisational culture and the management of employee risk. Chris Hurran OBE, Senior Associate Fellow, Institute for Security and Resilience Studies, University College London Malicious Insider Amongst all reported cybercrimes, those committed by malicious insiders in financial services (more than 50% of all cybercrimes) are amongst the most significant threats to networked systems and data. Much of the existing academic research and professional literature focuses on how to detect and prevent cybercrimes based on past crime patterns. A quantitative forecast on the cost impact of cybercrimes is still a challenging task. This session will feature a presentation of new research, sponsored by The SWIFT Institute, which aims to formulate a predictive cybercrime cost model that can be applied to malicious insider attacks within a financial institution. 10:00 11:00 Presentation: Vincent Lee, Clayton School of Information Technology, Monash University Richard Benham, Professor of Cyber Security Management and founder of The National MBA in Cyber Security, Coventry University Chris Hurran OBE, Senior Associate Fellow, Institute for Security and Resilience Studies, University College London Vincent Lee, Clayton School of Information Technology, Monash University Moderator: Mike Loginov, Chief Strategist, EMEA Public Sector - Cyber Security & CTO Strategy Group, HP Enterprise Security 11:00 11:30 Networking / Coffee Break Page: 2
3 11:30 12:30 Crypto Developments Cryptography plays a central role in securing both retail and wholesale financial systems. Cryptographic methods allow for new technological developments that present exciting business opportunities, but in the next decade our cryptographic technologies face major challenges. First, the security of the public key algorithms in use today depends on the assumption that a small set of problems from algebraic number theory is hard; a breakthrough in mathematics or in the development of large scale quantum computers could undermine their security. Second, cryptographic implementations and in particular implementations of random number generators have proven to be less robust than initially believed. Finally, the Snowden revelations have shown that governments have deliberately undermined cryptographic standards, resulting in new threats. This session will offer a perspective by leading experts on the cryptographic challenges faced by the banking industry, in the format of three brief presentations followed by a panel session. Presenters & Panellists: Daniel Bernstein, Professor, Department of Mathematics and Computer Science, Technische Universiteit Eindhoven Richard Horne, Partner, Cyber Security, PwC David King, Vice President and Head of Key Management Services, MasterCard Moderator: Professor Bart Preneel, Dept. Electrical Engineering-ESAT/COSIC (Computer Security and Industrial Cryptography), KU Leuven 12:30 13:30 Lunch 13:30 14:30 Organic Security versus Security by Design Banks have legacy systems, quite often multiple legacy systems that are decades old. Evolving business streams, mergers and acquisitions result in many firms having a spaghetti of systems. The cost and risk of replacing legacy systems often outweighs the benefits of replacing them with something new and improved. This presents challenges from a cyber-security perspective, as many banking platforms were designed at a time when cyber-security was not an issue. Protecting these systems requires a significant amount of cost and effort. How does this compare to firms who have designed their own new operating platforms? Does a new system offer better protection than a legacy system, or are the cyber risks simply different? What lessons can be learned from each model? With cyber-security an increasingly important focus area, are we approaching a time when legacy systems must be replaced? Ebbe Skak Larsen, Chief Security Architect, Danske Bank Jo Basselier, Head of IT Security Management, Euroclear Alain Desausoi, CSO, Head of Enterprise Security & Architecture, SWIFT Moderator: Dr. Starnes E. Walker, Founding Director, Cyber Security Initiative and Professor, Electrical & Computer Engineering, University of Delaware Page: 3
4 14:30 15:30 New Financial Products and their Security Vulnerabilities Just as the cyber landscape is forever shifting, so too does the financial industry itself. New financial products provide new opportunities for banks and clients alike, but by definition of being new, they can also present new and unknown security vulnerabilities. Virtual currencies, including digital and crypto currencies, are a prime example. In the news daily they are gaining acceptance through listings on exchanges and as a method of payment by mainstream retailers. Central banks, however, are wary of their use highlighting possible issues surrounding anonymity and anti-money laundering rules. How do new financial products compare to existing products in terms of their safety and security? Do new products such as virtual currencies provide more and easier opportunities for cyber criminals, or are they safer than the traditional financial system? This session will begin with a brief presentation aiming to explain what virtual currencies are and what they are not. Presentation: Sarah Meiklejohn, Faculty, University College London Sarah Meiklejohn, Faculty, University College London Elizabeth Petrie, Director Strategic Intelligence Analysis, Citi Marcus Treacher, Global Head of Innovation, Payments & Cash Management, HSBC Moderator: Richard Brown, Executive Architect, Banking and Financial Markets, IBM 15:30 16:00 Networking / Coffee Break 16:00 17:00 Supply Chain post-snowden As CEOs continue to look for cost reductions and efficiency improvements, working with third party vendors to supply key products and services is often the best way forward. Why do it internally if you can outsource it to someone who can do it better and cheaper? Trust and security, however, become ever more paramount when you have to rely on someone else, especially as you are still ultimately responsible to your customers. Most financial institutions work with multiple vendors, resulting in a complex supply chain. The bigger the supply chain, the greater the potential for cyber-attacks. What can and should you be doing to protect your institution and your network of suppliers? Mike Loginov, Chief Strategist, EMEA Public Sector - Cyber Security & CTO Strategy Group, HP Enterprise Security Jacques Hagelstein, Deputy CSO, Enterprise Security & Architecture, SWIFT Elizabeth Petrie, Director Strategic Intelligence Analysis, Citi Moderator: Bryan Glick, Editor-in-Chief, Computer Weekly Page: 4
5 17:00 17: 15 Wrap-up & Closing Professor Bart Preneel, Dept. Electrical Engineering-ESAT/COSIC (Computer Security and Industrial Cryptography), KU Leuven 17:15 19:00 Networking Cocktail & Cyber-security Board Game* * All registered delegates will be contacted prior to the conference with more details on the Cyber-security Board Game, asking interested participants to pre-register to play the game. Those attending the networking cocktail are welcome to watch those playing the game. Page: 5
Business Continuity & Resilience Conference
Business Continuity & Resilience Conference Venue: Date: The City, London (TBC) 9 September 2014 Building capacity for resilient growth and development Speakers include: Andrew Gracie Executive Director
Seminar Conduct and Protocol Nicholas Witchell, for Payments UK. Welcome Maurice Cleaves, Payments UK
DAY TWO WEDNESDAY 28 OCTOBER (MORNING SESSION) AGENDA DAY ONE TUESDAY 27 OCTOBER 8.00 Event Registration 8.50 Seminar Conduct and Protocol Nicholas Witchell, for Payments UK All briefings and comments
Building Blocks of a Cyber Resilience Program. Monika Josi [email protected]
Building Blocks of a Cyber Resilience Program Monika Josi [email protected] About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
Cyber-Security. FAS Annual Conference September 12, 2014
Cyber-Security FAS Annual Conference September 12, 2014 Maysar Al-Samadi Vice President, Professional Standards IIROC Cyber-Security IIROC Rule 17.16 BCP The regulatory landscape Canadian Government policy
Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc
Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Partnership for Cyber Resilience
Partnership for Cyber Resilience Principles for Cyber Resilience 1. Recognition of interdependence: All parties have a role in fostering a resilient shared digital space 2. Role of leadership: Encourage
CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015
BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting
Cyber Security - What Would a Breach Really Mean for your Business?
Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
UCL MSc in Information Security. Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com
UCL MSc in Information Security Dr Emiliano De Cristofaro MSc Course Director 2015/16 https://emilianodc.com About UCL Established in 1826 First institution to welcome students of any race, class or religion,
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
REGISTER AT IIF.COM/TRAINING
IIF EXECUTIVE PROGRAM ON PRIVATE BANKING AND WEALTH MANAGEMENT Evolving Wealth Transformation in Dynamic Growth Markets November 16-17, 2015 Singapore IN COOPERATION WITH COURSE DESCRIPTION IIF EXECUTIVE
Briefing note: GCHQ Internships
Briefing note: GCHQ Internships GCHQ 1 is developing new capabilities in partnership with Industry and Academic Researchers to pursue their cyber security. GCHQ is partnering with the Smith Institute 2
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
Cyber Security & Managing KYC Data
SPECIAL REPORT Cyber Security & Managing KYC Data The views and opinions expressed in this paper are those of the author(s) and do not necessarily reflect the official policy or position of Thomson Reuters.
Cyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program
Cyber: The Catalyst to Transform the Security Program Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA A Common Language? Hyper Connected World Rapid IT Evolution Agile Targeted Threat
Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]
Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
Welcome to the 1 st Annual Executive Seminar & Workshop in Predictive Analytics + Big Data
International Association for the Management of Digital Analytics Standards, Training and Certification for Digital Analytics Management Managed Analytic Services Inc. Data Analysis Expertise Insight Value
Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)
Course introduction It is vital to ensure that your business is protected against the threats of fraud and cyber crime and that operational risk processes are in place. This three-day course provides an
Who s next after TalkTalk?
Who s next after TalkTalk? Frequently Asked Questions on Cyber Risk Fraud threat to millions of TalkTalk customers TalkTalk cyber-attack: website hit by significant breach These are just two of the many
ACE European Risk Briefing 2012
#5 ACE European Risk Briefing 2012 IT and cyber risk respondent profiles The research was carried out between 13 April and 3 May 2012. The sample comprised 606 European risk managers, CROs, CFOs, COOs
Tackling fraud in the charity sector Making your money count
Supported by Tackling fraud in the charity sector Making your money count Friday 30 October 2015 Royal College of Physicians, London A conference run by the charity sector for the charity sector About
Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards
Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards Private Banking: London 2015 asks important questions about the future of private banking in the face of a dramatically
FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
TRANSATLANTIC CYBER SECURITY SUMMIT
TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:
Partnership prospectus
Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY
CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY CLOSING THE DOOR TO CYBER ATTACKS Cybersecurity and information security have become key challenges for
Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
Cyber-Intelligence and Cyber-Espionage
London First Cyber-Intelligence and Cyber-Espionage Roundtable 23 October 2013 Sponsored and Hosted by Avanta CONTENTS Executive Summary Introduction Cyber-Warfare: The Emerging Frontier I. CASCADING FAILURE
Forensics Europe Expo 2015 Conference Programme
Book before 20 February 2015 to save up to 20% Forensics Europe Expo 2015 Conference Programme The Only Dedicated International Forensics Exhibition and Conference The Meeting Place for Professionals Involved
FFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.
Top Ten Fraud Risks That Impact Your Financial Institution Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC Agenda Education on understanding the fraud risk Take away.. Education to
Waking Shark II Desktop Cyber Exercise
Waking Shark II Desktop Cyber Exercise Tuesday 12 November 2013 Author: Chris Keeling Summary The Waking Shark II exercise, held on 12 November, was designed to rehearse the response of the wholesale banks
Cyber Risk & Insurance
Cyber Risk & Insurance The Risk Managers Forum Thursday 27 November 2014 One-day conference Grange City Hotel, 8-14 Cooper s Row, London EC3N 2QB Event sponsor Headline sponsor Cyber Risk & Insurance The
EY Cyber Security Hacktics Center of Excellence
EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find
Cyber crime risk management protecting your business 4 November 2015
Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC
Enhancing Safeguards Through Information Analysis: Business Analytics Tools. IAEA, Vienna, 09/10/2014. General Use
Enhancing Safeguards Through Information Analysis: Business Analytics Tools IAEA, Vienna, 09/10/2014 Julian Midwinter - Business Unit Executive i2, Threat and Counter Fraud General Use 2014 IBM Corporation
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
How To Protect Your Business From A Cyber Attack
Intelligence FIRST helping your business make better decisions Cyber security Keeping your business resilient Cyber security is about keeping your business resilient in the modern technological age. It
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties
Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties Pamela Passman President and CEO Center for Responsible Enterprise And Trade (CREATe.org)
www.pwc.co.uk Cyber security Building confidence in your digital future
www.pwc.co.uk Cyber security Building confidence in your digital future November 2013 Contents 1 Confidence in your digital future 2 Our point of view 3 Building confidence 4 Our services Confidence in
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security
Seamus Reilly Director EY Information Security [email protected] 0207 951 3179 Cyber Security An Internal Audit perspective on the threats and responses within the Retail Sector 15 th May 2014 Agenda Introductions
HPC IN Cybersecurity. 2015 Annual Technical Meeting. Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042
HPC IN Cybersecurity 2015 Annual Technical Meeting Venue: Schlumberger 10001 Richmond Ave, Houston, TX 77042 FEATURED SPEAKERS Addison Snell CEO, Intersect360 Research Addison Snell is the CEO of Intersect360
How To Manage Risk On A Scada System
Risk Management for Industrial Control Systems (ICS) And Supervisory Control Systems (SCADA) Information For Senior Executives (Revised March 2012) Disclaimer: To the extent permitted by law, this document
2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP
2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf
CYBER SECURITY PROTECTING YOUR BUSINESS James Hatch Director, Cyber Services BAE Systems Applied Intelligence 1 CYBER SECURITY AT BAE SYSTEMS Professional Services Technical Services Prepare Protect Cyber
Keeping New Zealand s Economy Cyber Secure
Keeping New Zealand s Economy Cyber Secure CYBER SECURITY SUMMIT 5 May 2016 MINISTERIAL FOREWORD Kia ora and welcome to New Zealand s first ever Cyber Security Summit. We can all agree that cyber security
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral
Targeting the problem together
18 October, Marriott Grosvenor Square, London postevents.co.uk/fraud Targeting the problem together Associate Sponsor Media Partner Fraud 2012 has been accredited by the CII and can be included as part
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au
Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au Cyber attack is one of the biggest threats to Australian businesses, however many Chief Executive Officers (CEOs) admit a lack
CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES
POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response
For personal use only
Prophecy International Holdings Ltd. Ed Reynolds Chairman 1 Legal Disclaimer This presentation has been prepared by Prophecy International Holdings Limited. The information in this presentation is of a
A FORUM FOR DEBATE, A CATALYST FOR CHANGE
7 March 2013 Renaissance Hong Kong Harbour View Hotel Hong Kong A FORUM FOR DEBATE, A CATALYST FOR CHANGE 2013 conference highlights: The impact of the increasing frequency and severity of natural catastrophes
Research Topics in the National Cyber Security Research Agenda
Research Topics in the National Cyber Security Research Agenda Trust and Security for our Digital Life About this document: This document summarizes the research topics as identified in the National Cyber
Exercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
Managing cyber risk the global banking perspective
1 Managing cyber risk the global banking perspective Speech given by Andrew Gracie, Executive Director, Resolution, Bank of England British Bankers Association Cyber Conference, London 10 June 2014 2 I
Compliance Guide: ASD ISM OVERVIEW
Compliance Guide: ASD ISM OVERVIEW Australian Information Security Manual Mapping to the Principles using Huntsman INTRODUCTION In June 2010, The Australian Government Protective Security Policy Framework
How To Handle A Threat From A Corporate Computer System
Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns
2. Cyber security research in the Netherlands
2. Cyber security research in the Netherlands Jan Piet Barthel MSc Netherlands Organization for Scientific Research A strong motivation to enforce CS research: Absence or lack of cyber security is listed
Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
Cyber Security key emerging risk Q3 2015
Cyber Security key emerging risk Q3 2015 The study is based on interviews with CIO:s, CISO:s and Head of Security in August and September 2015. November 2015 www.pwc.se Companies falling behind are more
Safety by trust: British model of cyber security. David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw
Safety by trust: British model of cyber security David Wallace, First Secretary, Head of of the Policy Delivery Group British Embassy in Warsaw Strategy Structure Campaign Partnerships Strategy The UK
GLOBAL CYBER SECURITY LEADERS
ANNUAL SUMMIT GLOBAL CYBER SECURITY LEADERS EXCLUSIVE. INNOVATIVE. CONTENT DRIVEN. 30 th NOVEMBER - 1 st DECEMBER, 2015 WALDORF ASTORIA BERLIN GERMANY IMPROVING THE STATE OF CYBER SECURITY IN THE DIGITAL
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS
THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS Download the entire guide and follow the conversation at SecurityRoundtable.org Collaboration and communication between technical
North Texas ISSA CISO Roundtable
North Texas ISSA CISO Roundtable Roundtable Topic Threat Against Our Well Being The Most Effective Methods in Combating and Responding to the Cyber Attack Event Sponsor Moderator and Panelists David Stanton
Secure Software Development Trends in the Oil & Gas Sectors. How the Microsoft Security Development Lifecycle helps protect critical industries
Secure Software Development Trends in the Oil & Gas Sectors How the Microsoft Security Development Lifecycle helps protect critical industries Secure Software Development Trends in the Oil & Gas Sectors
Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
A GOOD PRACTICE GUIDE FOR EMPLOYERS
MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade
Risk Management in Global Operating Industry
Risk Management in Global Operating Industry World Financial Symposium 2015 Here is the News Saleema Brohi Aviation Legal Expert Session Sponsor World Financial Symposium 2015 Cyber Attack! - Beyond Firewalls
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
