HOTEL RAMADA,

Size: px
Start display at page:

Download "HOTEL RAMADA, 25-26.09.2013"

Transcription

1 HOTEL RAMADA, , 09:00-13:00 Pre-congress workshop "THE BASICS OF IT SECURITY" Neutral and open initiations for Individuals and SME's , 14:00 Congress Official Opening , 15:00-17:45 Plenary session , 17:45-18:45 Real hacking demonstration, by Bitdefender team , 09:00-17:30 Plenary session , 17:30-18:30 Congress conclusions

2 25th of September, morning : "THE BASICS OF IT SECURITY" SPECIAL WORKSHOP MORNING for Individuals and SME's Registration : 08:00; starting 09:00 am 25th of September : FIRST SESSION, 09:00 pm - 10:30 pm Mauro Vignati, Federal Intelligence Service, Switzerland, MELANI reporting centre Case Study Switzerland: Organized Economic Crime Philippe Joliot, President, TRACIP and Senior expert at the Nancy Court of Justice Cyber investigation : an innovative solution for Companies Paolo Dal Checco, expert witness, court-appointed technical advisor with ongoing roles of Computer Forensics Analyst and Examiner for attorneys, Law Enforcement Officers and private citizens Mobile Forensics with Closed and Open Source Tools : a good investment for Companies Andrea Zapparoli Manzoni, Senior expert in ICT security, Clusit (Information Security Italian Association) Major Cyber Threats to SMEs, future Trends and Countermeasures Mattia Epifani, digital forensics specialist for judges, prosecutors, lawyers and private companies, both as Court Witness Expert and Digital Forensics Expert, Genova Mobile risks and countermeasures for Companies 25th of September : COFFEE BREAK, 10:30 pm - 11:00 pm 25th of September : SECOND SESSION, 11:00 pm - 13:00 pm Isabelle Augsburger-Bucheli, Dean and Professor at the ILCE (Institute for Economic Crime Investigation), Neuchâtel, Switzerland The fight against cybercrime in a company: the significant role of the human factor Romain Roubaty, Professor at the ILCE (Institute for Economic Crime Investigation), Neuchâtel, Switzerland Minimal cyber-prevention requirements for Small and Medium Companies Catalin Cosoi, Cyber Security Strategist, Bitdefender Romania How can a company target today s security threats, but also defend against zero-day attacks? Romain Roubaty & Bitdefender team, Practical demonstrations of Hardware and Software Intrusions

3 WELCOME ADRESSES 25th of September: OFFICIAL OPENING OF THE CONGRESS, 14:00 pm H.E. Jean-Hubert LEBET Ambassador of Switzerland to Romania Marco OBISO World Coordinator for Cyber Security, International Telecommunications Union (UNO-GENEVA) Iulian FOTA Counsellor to the President of Romania, Head of the National Security Department Ioan-Ovidiu SITTERLI Prefect of Sibiu Ioan CINDREA President of the County Council of Sibiu Prof. Dr. Ing. Ioan BONDREA Rector of the 'Lucian Blaga' University of Sibiu Cristina UNGUREANU Director, Chamber of Commerce Switzerland-Romania Eugen IORDANESCU Director, Chamber of Commerce, Industry and Agriculture, Sibiu Jörg PROHASZKA Director, Deutscher Wirtschaftsklub Siebenbürgen Daniela CHRZANOVSKI, Laurent CHRZANOVSKI, Ionel NITU, Dorel SANDOR Organizers

4 25th of September : FIRST SESSION, 15:00 pm - 16:10 pm Florin TALPES, CEO, Bitdefender Foreword. Dumitru COCORU, Mr. General, deputy director, SRI Foreword Iulian FOTA, Counsellor to the President of Romania, Head of the National Security Department Introductory Speech Marco OBISO, World Coordinator for Cyber Security, International Telecommunications Union (UNO-GENEVA) Toward a global approach on Cybersecurity Mauro VIGNATI, Chief Analyst, Federal Intelligence Service, Switzerland, MELANI reporting centre The Private Public Partnership and the National Cyber Strategy: how to work together for reducing cyber risks Adrian Ionuţ AXINIA, Chief of the Direction for Information Technology, Service of Special Transmission A model of information exchanges between units of CERT-type 25th of September : COFFEE BREAK, 16:00 pm - 16:30 pm 25th of September : SECOND SESSION, 16:30 pm - 17:45 pm Sorin ENCUTESCU, Counsellor to the Prime Minister of Romania for National Security Matters and President of the Inter-ministerial Committee for Evaluation of the State of the Security Industry Foreword Mircea CAZAN, Deputy of Sibiu, Parliament of Romania, IT Commission For a cyber-secured Sibiu. Florin COSMOIU, SRI (Romanian Intelligence Service), Head of CYBERINT National Centre Cyber Intelligence the Change of the National Security Paradigm Eduard BISCEANU, Deputy General Director, CERT : Romanian National Security Incident Response Team Statistics and conclusions of cyber security incidents in the firsts 6 months of 2013 and trends of cyber security issues in Romania.

5 Radu STANESCU, CEO and Founder, Sandline - an IT Security company focused on penetration testing and consultancy services Cyber Security in the era of Cyber War and Cyber Espionage Isabelle AUGSBURGER-BUCHELI, Dean and Professor at the ILCE (Institute for Economic Crime Investigation), Neuchâtel, Switzerland The fight against cybercrime in a company: the significant role of the human factor 25th of September : FROM THE OTHER SIDE OF THE WALL (1), 17:45 pm - 18:45 pm Cătălin COSOI, Chief Security Strategist, Bogdan BOTEZATU, Senior ethreat Analyst, Bitdefender Hacking demonstration. 25th of September : COCKTAIL AT THE CITY HALL, 19:00 pm Welcome speech by Klaus Werner IOHANNIS Mayor of Sibiu Address by H.E. Jean-Hubert LEBET Ambassador of Switzerland to Romania Social media heroes and victims, yesterday and today : two words about the exhibition Laurent Chrzanovski & Swiss Webacademy Team 25th of September : OFFICIAL DINNER, HOTEL RAMADA, 20:45 pm Welcome speech by Bogdan DUMITRU CTO, Bitdefender

6 26th of September : FIRST SESSION, 09:00 am - 10:45 am Gabriel SERVAN, Professor at "Lucian Blaga" University, Sibiu. Short presentation of the series "Studia Securitatis", where the Acts of the Congress will be published as a special monograph Ioana VASIU, Professor at the Faculty of Law, Babeş-Bolyai University and Director for International Affairs of Paul Negulescu Institute of Administrative Sciences, Sibiu. User-Generated Content Websites, A Profitable Medium for Cybercriminals Valerian VREME, Deputy, Parliament of Romania, IT Commission Cyber in a Social (Connected) World. Andrea ZAPPAROLI MANZONI, Senior expert in ICT security & Founder, Security Brokers, a team of Cyber Security Experts from all over the world, that focuses on highly critical, strategic ICT Security and Cyber Defense issues From Social Media Chaos to Social Business Security Latif LADID, President, IPv6 Forum, Professor at the University of Luxemburg and Chair of multiple EU and EC Commissions on the thematic The New Internet Based on IPv6 and the new Internet Vulnerabilities. Paolo DAL CHECCO, member of IISFA Italian Chapter association and founder of the DEFT Association, formerly known as DEFT Linux Project; expert witness, court-appointed technical advisor with ongoing roles of Computer Forensics Analyst and Examiner for attorneys, Law Enforcement Officers and private citizens Mobile Forensics with Closed and Open Source Tools : a good investment for Companies 26th of September : COFFEE BREAK, 10:45 pm - 11:15 am 26th of September : SECOND SESSION, 11:15 am - 13:00 pm Mattia EPIFANI, digital forensics specialist for judges, prosecutors, lawyers and private companies, both as Court Witness Expert and Digital Forensics Expert, Genova Mobile risks and countermeasures for Companies Romain ROUBATY, Professor at the ILCE (Institute for Economic Crime Investigation), Neuchâtel, Switzerland Minimal cyber-prevention requirements for Companies Razvan-Cosmin GRIGORESCU, President of the IT & C Security Commission of the Romanian Banking Association, Information Security Manager & CISO CEC BANK SA, Data loss a daily menace... Bogdan-Mihai ZAMFIR, CISM, C CISO, Head of ICT Security, UniCredit Tiriac Bank ICT Security challenges in Banking Razvan Macovei, Director, Head of Operational, Information and Security Risk Management, ING BANK Cyber Threats in digital era banking. Practical considerations Cristian TOMA, Associate Professor, Department of Economic Informatics and Cybernetics - D.I.C.E/D.E.I.C, Faculty of Cybernetics, Statistics and Economic Informatics - C.S.I.E/C.S.E.I, Bucharest University of Economic Studies Mobile Payments Security Issues Overview

7 26th of September : BUFFET LUNCH, 13:00 pm - 14:00 pm 26th of September : THIRD SESSION, 14:00 pm - 15:45 pm Liviu FLESAR, penetration tester, NETSEC Web Security: beyond appearances Alexandru Catalin COSOI, Chief Security Strategist, Bitdefender Evaluating the fitness of cyber-security strategies Adriean PARLOG, MG (Ret.), Associate professor at the National Defence College and guest professor at Lucian Blaga University Sibiu Order in the virtual world Ciprian PUSTIANU, Technology Senior Sales Consultant, Oracle Romania Cybersecurity strategy for evolving threats Ionel NITU, Independent analyst, Executive Director at Intergraph Computer Services, President of ASIA Bogdan ALDEA, Chief of the Development Office, VP Holding The Probability of a Cyber Attack and its Impact on Business Environment Dan PREISZ, Public Sector, Public Security and Competitive Intelligence manager for the Romanian branch of SAP SAP Cyber intelligence analysis platform : a presentation 26th of September : COFFEE BREAK, 15:45 pm - 16:15 pm 25th of September : FROM THE OTHER SIDE OF THE WALL (2), 16:15 pm - 16:45 pm Romain ROUBATY, Professor at the ILCE (Institute for Economic Crime Investigation), Neuchâtel, Switzerland Practical exemples of hardware intrusion 26th of September : FOURTH SESSION, 16:45 pm - 17:30 pm Philippe JOLIOT, President, TRACIP and Senior expert at the Court of Justice of Nancy Cyber investigation : an innovative solution for Companies Bogdan DUMITRU, CTO, Bitdefender Romania Viorel CANJA, Head of Antimalware and Antispam Labs Today's security Challenges. 26th of September : CONCLUSIONS, 17:30 pm - 18:30 pm Organizers Farewell Speech 26th of September : OPTIONAL DINNER, ASTRA OPEN AIR MUSEUM (optional) Welcome speech by Valeriu OLARU, Director, NATIONAL MUZEAL COMPLEX "ASTRA"

8 Special events for participants , 19:00 Cocktail at the Sibiu City Hall Welcome by the Mayor of Sibiu, Klaus Werner Iohannis Address by the Ambassador of Switzerland to Romania, H.E. Jean-Hubert Lebet Opening of the exhibition "Social Media Heroes, Social Media Victims"

09:00 Official Opening 09:00 - Marco Obiso, ITU/UN-Geneva, World cybersecurity coordinator - H.E. Jean-Hubert Lebet, Ambassador of Switzerland to

09:00 Official Opening 09:00 - Marco Obiso, ITU/UN-Geneva, World cybersecurity coordinator - H.E. Jean-Hubert Lebet, Ambassador of Switzerland to DAY 1 09:00 Official Opening 09:00 - Marco Obiso, ITU/UN-Geneva, World cybersecurity coordinator - H.E. Jean-Hubert Lebet, Ambassador of Switzerland to Romania - Ovidiu Sitterli, Prefect of Sibiu - Constantin

More information

CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME -

CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME - CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME - SECURITY TRAINING DAYS Monday 21 September Wednesday 23 September 2015 AWARENESS DAY Wednesday, 23 September 2015 LIVE DEMONSTRATIONS, CONGRESS 1 st DAY Thursday,

More information

SCHEDULE. The 7 th International Conference on Security for Information Technology and Communications (SECITC'14)

SCHEDULE. The 7 th International Conference on Security for Information Technology and Communications (SECITC'14) SCHEDULE of The 7 th International Conference on Security for Information Technology and Communications (SECITC'14) Powered by Informatics Security / IT&C Security Master Bucharest University of Economic

More information

Day 3-24 April 2013. Day 2-23 April 2013

Day 3-24 April 2013. Day 2-23 April 2013 Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim

More information

CONSULTING IMAGE PLACEHOLDER

CONSULTING IMAGE PLACEHOLDER CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization

More information

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and

More information

CYBER INTELLIGENCE EUROPE 28 th 30 th September 2015 Bucharest, Romania

CYBER INTELLIGENCE EUROPE 28 th 30 th September 2015 Bucharest, Romania CYBER INTELLIGENCE EUROPE 28 th 30 th September 2015 Bucharest, Romania ORGANISED BY: Sponsors & Exhibitors Speakers Include: Bebe-Viorel Ionica, Secretary of State, Ministry of Information Communication

More information

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration

CYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation

More information

GEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT

GEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT GEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT INTERNATIONAL CONFERENCE ON CYBER ENGAGEMENT: ENHANCING COOPERATION ACROSS DIGITAL BORDERS Monday, April 27, 2015 8:00 a.m. 6:30

More information

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009 Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

More information

Cybersecurity Market Profile [1] - Romania

Cybersecurity Market Profile [1] - Romania Cybersecurity Market Profile [1] - Romania March 2014 Produced by the Canadian Trade Commissioner Service 1. Sector Overview Value of imports and exports In total Romanian Gross Domestic product for 2013

More information

ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness

ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness Pre-Congress B-CCENTRE Workshop 3 February 2015 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction:

More information

Cyber Risk and Insurance What companies need to know

Cyber Risk and Insurance What companies need to know Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Maritime Security Conference. The Challenges, Benefits and Opportunities of the European Union Maritime Security Strategy

Maritime Security Conference. The Challenges, Benefits and Opportunities of the European Union Maritime Security Strategy REPUBLIC OF CYPRUS MINISTRY OF DEFENCE Maritime Security Conference (12-13 November 2015, Nicosia, Cyprus) The Challenges, Benefits and Opportunities of the European Union Maritime Security Strategy The

More information

RAISA Romanian Association for Information Security Assurance PURPOSE OBJECTIVES

RAISA Romanian Association for Information Security Assurance PURPOSE OBJECTIVES RAISA Romanian Association for Information Security Assurance is a professional, non-governmental, non-partisan political, nonprofit and public benefit association. PURPOSE The aim of Romanian Association

More information

Romanian National Computer Security Incident Response Team CERT-RO. dan.tofan@cert-ro.eu http://www.cert-ro.eu

Romanian National Computer Security Incident Response Team CERT-RO. dan.tofan@cert-ro.eu http://www.cert-ro.eu Romanian National Computer Security Incident Response Team CERT-RO dan.tofan@cert-ro.eu http://www.cert-ro.eu About A Digital Agenda for Europe, Pillar : Trust and Security, Action 38 Member States to

More information

How To Understand And Understand The European Priorities In Information Security

How To Understand And Understand The European Priorities In Information Security European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria

More information

U. S. Attorney Office Northern District of Texas March 2013

U. S. Attorney Office Northern District of Texas March 2013 U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate

More information

TRANSATLANTIC CYBER SECURITY SUMMIT

TRANSATLANTIC CYBER SECURITY SUMMIT TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:

More information

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP

More information

AGENCY: International Trade Administration, Department of Commerce.

AGENCY: International Trade Administration, Department of Commerce. This document is scheduled to be published in the Federal Register on 09/30/2014 and available online at http://federalregister.gov/a/2014-23210, and on FDsys.gov DEPARTMENT OF COMMERCE International Trade

More information

Privacy in the Digital Age of Encryption and Anonymity Online

Privacy in the Digital Age of Encryption and Anonymity Online The Hague (NL), 19-20 May 2016 ACCESSING FILES. ACCESS DENIED! DATA ENCRYPTED. TARGET GROUP This conference is open to anyone who is dealing with privacy and security in an online environment. Europol

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.

Cyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues. Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating

More information

TURNING THE RISING TIDE OF CYBERSECURITY THREATS

TURNING THE RISING TIDE OF CYBERSECURITY THREATS TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes

More information

Strategy Advisory Group SA. Corporate Training. Information Security Awareness Program 1

Strategy Advisory Group SA. Corporate Training. Information Security Awareness Program 1 IT & IP Strategy Advisory Group SA Corporate Training Information Security Awareness Program 1 March 2011 - SONY : Over 100 million stolen personal data September 2011 - Mitsubishi Heavy Industries : At

More information

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation

Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie Developments in Security Regulation Agenda Introduction PM & C Cybersecurity Review Mandatory Data Retention Legislation Overview

More information

National Cyber Security Strategy of Afghanistan (NCSA)

National Cyber Security Strategy of Afghanistan (NCSA) Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA

More information

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015

CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting

More information

Cyber crime risk management protecting your business 4 November 2015

Cyber crime risk management protecting your business 4 November 2015 Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC

More information

June 4 th to 6 th, 2012. Plenary 2 - Annex II - Chamber of Deputies Brasilia, Brazil

June 4 th to 6 th, 2012. Plenary 2 - Annex II - Chamber of Deputies Brasilia, Brazil June 4 th to 6 th, 2012 Plenary 2 - Annex II - Chamber of Deputies Brasilia, Brazil Support: Realization: Background The Regional Workshop Connected Parliaments - Introduction to Legislative XML, is being

More information

The global challenge

The global challenge The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer

More information

20th Council of Europe Conference of Directors of Prison and Probation Services. 9-10 June 2015 Bucharest, Romania

20th Council of Europe Conference of Directors of Prison and Probation Services. 9-10 June 2015 Bucharest, Romania 12/06/2015 20th Council of Europe Conference of Directors of Prison and Probation Services 9-10 June 2015 Bucharest, Romania RADICALISATION AND OTHER STRATEGIC CHALLENGES PROGRAMME www.coe.int/cdpps2015

More information

Critical Infrastructure Protection in Germany

Critical Infrastructure Protection in Germany ETH-ÖCB-CRN Workshop Critical Infrastructure Protection in Europe Lessons Learned and Steps Ahead November 8-10, 2001 Critical Infrastructure Protection in Germany Dr. Susanne Jantsch IABG mbh, Dept. IT

More information

Forensics Europe Expo 2015 Conference Programme

Forensics Europe Expo 2015 Conference Programme Book before 20 February 2015 to save up to 20% Forensics Europe Expo 2015 Conference Programme The Only Dedicated International Forensics Exhibition and Conference The Meeting Place for Professionals Involved

More information

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.

Good morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity. Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

Cybersecurity and the Romanian business environment in the regional and European context

Cybersecurity and the Romanian business environment in the regional and European context KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory

More information

Middle Class Economics: Cybersecurity Updated August 7, 2015

Middle Class Economics: Cybersecurity Updated August 7, 2015 Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest

More information

Tempus Regional Seminar on Human Resource Management In Higher Education

Tempus Regional Seminar on Human Resource Management In Higher Education TEMPUS Programme Tempus Regional Seminar on Human Resource Management In Higher Education Western Balkans Sarajevo 14th - 15th June 2012 PROGRAMME http://eacea.ec.europa.eu/tempus PROGRAMME "Tempus Regional

More information

FINAL // FOR OFFICIAL USE ONLY. William Noonan

FINAL // FOR OFFICIAL USE ONLY. William Noonan FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States

More information

Programme. 8.30am. 10.40am

Programme. 8.30am. 10.40am 8.30am 9.00am 9.15am 9.35am 9.40am 8.30am 10.10am 10.40am 11.10am 11.35am 12.00pm 12.25pm 1.40pm 2.05pm 2.30pm 2.55pm 3.25pm 3.50pm 4.15pm Programme Registration Welcome Address Mr Lau Thiam Beng Deputy

More information

Information Security Summit 2005

Information Security Summit 2005 Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government

More information

Cyber Security Awareness Workshop

Cyber Security Awareness Workshop December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing

More information

AGENDA. Food Contact Materials: Working Together for Safety and Innovation in Europe

AGENDA. Food Contact Materials: Working Together for Safety and Innovation in Europe AGENDA Food Contact Materials: Working Together for Safety and Innovation in Europe Page 2 Conference Food contact materials: working together for safety and innovation in Europe 30 th September 2015 Luxembourg,

More information

New challenges in Data privacy.

New challenges in Data privacy. New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013

More information

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage

ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November

More information

Cyber Diplomacy A New Component of Foreign Policy 6

Cyber Diplomacy A New Component of Foreign Policy 6 Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual

More information

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies

More information

Introduction to Cybersecurity Overview. October 2014

Introduction to Cybersecurity Overview. October 2014 Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,

More information

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University

Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path

More information

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo

NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo 2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,

More information

InfoSec Academy Application & Secure Code Track

InfoSec Academy Application & Secure Code Track Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security

More information

The 2012/3 SA Cyber Threat Barometer. Craig Rosewarne

The 2012/3 SA Cyber Threat Barometer. Craig Rosewarne The 2012/3 SA Cyber Threat Barometer Craig Rosewarne An improved cyber security framework for South Africa Research - Initiatives South Africa (Pty) Ltd Stakeholder Risk Management / Alignment to business

More information

Roadmap for new Cyber security education in ME

Roadmap for new Cyber security education in ME Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the

More information

Developing a Mature Security Operations Center

Developing a Mature Security Operations Center Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and

More information

Cyber Security in the Financial Industry

Cyber Security in the Financial Industry Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today

More information

22 ND ANNUAL REVIEW OF THE FIELD

22 ND ANNUAL REVIEW OF THE FIELD 22 ND ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW CO-SPONSORED BY THE AMERICAN BAR ASSOCIATION STANDING COMMITTEE ON LAW AND NATIONAL SECURITY CENTER FOR NATIONAL SECURITY LAW, UNIVERSITY OF VIRGINIA

More information

Conference. Shared histories for a Europe without dividing lines"

Conference. Shared histories for a Europe without dividing lines Strasbourg, 1 st April 2014 Conference Shared histories for a Europe without dividing lines" Vienna, 9-10 April 2014 Conference organised in co-operation with Vienna University in the framework of the

More information

OWL CROSS DOMAIN FORUM

OWL CROSS DOMAIN FORUM Owl Computing Technologies R WELCOME TO THE 9TH ANNUAL OWL CROSS DOMAIN FORUM MAY 8, 2013 www.owlcti.com AGENDA 0800-1700 Demonstration room exhibits 0800-0900 Continental breakfast 0900-1000 Owl new technology

More information

Cyber Security @ ITU. By Tomas Lamanauskas, ITU

Cyber Security @ ITU. By Tomas Lamanauskas, ITU Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and

More information

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime? Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies

More information

MULTI ANNUAL WORK PLAN 2013 2015

MULTI ANNUAL WORK PLAN 2013 2015 MULTI ANNUAL WORK PLAN 2013 2015 Translation into English: Elena Arrebola 1. CONTEXT a) Mandate The Council promotes the principle of equal treatment and non-discrimination of persons on racial or ethnic

More information

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading

CYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical

More information

Lessons from Defending Cyberspace

Lessons from Defending Cyberspace Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat

More information

Report on CAP Cybersecurity November 5, 2015

Report on CAP Cybersecurity November 5, 2015 Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets

More information

INTERNATIONAL ENGAGEMENT ON CYBER: DEVELOPING INTERNATIONAL NORMS FOR A SAFE, STABLE & PREDICTABLE CYBER ENVIRONMENT

INTERNATIONAL ENGAGEMENT ON CYBER: DEVELOPING INTERNATIONAL NORMS FOR A SAFE, STABLE & PREDICTABLE CYBER ENVIRONMENT Georgetown University Institute for Law, Science and Global Security INTERNATIONAL ENGAGEMENT ON CYBER: DEVELOPING INTERNATIONAL NORMS FOR A SAFE, STABLE & PREDICTABLE CYBER ENVIRONMENT Tuesday, March

More information

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing

More information

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department

More information

El Camino College Homeland Security Spring 2016 Courses

El Camino College Homeland Security Spring 2016 Courses El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore

More information

The UK cyber security strategy: Landscape review. Cross-government

The UK cyber security strategy: Landscape review. Cross-government REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape

More information

SpeakUp. Conference. 22 October 2015 Cleopatra Hotel Nicosia, Cyprus

SpeakUp. Conference. 22 October 2015 Cleopatra Hotel Nicosia, Cyprus SpeakUp Conference 22 October 2015 Cleopatra Hotel Nicosia, Cyprus General Information ORGANISER: Transparency International Cyprus Transparency International Cyprus (TI-C) has been established in 2011,

More information

Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today!

Wednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today! EVENT NOTICE Making the Business Case for Cybersecurity & Public-Private Sector Cooperation Wednesday, March 11, 2015 8:00am to 4:30pm Presented by: ISACA - Greater Hartford Chapter Guest Speaker: Judith

More information

What legal aspects are needed to address specific ICT related issues?

What legal aspects are needed to address specific ICT related issues? What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn

More information

BOARD OF GOVERNORS MEETING JUNE 25, 2014

BOARD OF GOVERNORS MEETING JUNE 25, 2014 CYBER RISK UPDATE BOARD OF GOVERNORS MEETING JUNE 25, 2014 EXECUTIVE SUMMARY Cyber risk has become a major threat to organizations around the world, as highlighted in several well-publicized data breaches

More information

SECURING YOUR ENTERPRISE MOBILITY

SECURING YOUR ENTERPRISE MOBILITY SECURING YOUR ENTERPRISE MOBILITY STRATEGY, OPERATION & TECHNOLOGY INTERACTIVE TRAINING WORKSHOP Burj Al Arab, Dubai th th th 16, 17 & 18 March 2015 ABOUT LUCIDEUS Lucideus is a cyber space security leader

More information

PERSONAL DATA: Born on 26 October 1954, Ponor commune, Alba County, Romania.

PERSONAL DATA: Born on 26 October 1954, Ponor commune, Alba County, Romania. VICTOR CIORBEA PERSONAL DATA: Born on 26 October 1954, Ponor commune, Alba County, Romania. NATIONALITY: Romanian CITIZENSHIP: Romanian ADDRESS: Intrarea Valului St., no.14, Sector 1, Bucharest, Romania.

More information

MEETING THE NATION S INFORMATION SECURITY CHALLENGES

MEETING THE NATION S INFORMATION SECURITY CHALLENGES MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY

More information

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.

Panel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems. Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert

More information

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group

CYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group 1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is

More information

Cyber Security Strategy of Georgia

Cyber Security Strategy of Georgia Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in

More information

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until

More information

Executive Cyber Security Training. One Day Training Course

Executive Cyber Security Training. One Day Training Course Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand

More information

Working with the FBI

Working with the FBI Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement

More information

Draft Program. Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on

Draft Program. Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on CYBER SECURITY Central European University, Budapest http://www.cmcs.ceu.hu/cybersecurity/main

More information

Capacity Building to Strengthen Cybersecurity: Thailand Update

Capacity Building to Strengthen Cybersecurity: Thailand Update Capacity Building to Strengthen Cybersecurity: Thailand Update ASEAN Regional Forum Workshop on Measures to Enhance Cyber Security Legal and Cultural Aspects September 11-12, 2013 1 1 Chain is only as

More information

Resume. Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918. University of Colorado Colorado Springs, Colorado

Resume. Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918. University of Colorado Colorado Springs, Colorado Resume Name: Address: Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918 Contact Information:mmartin8@uccs.edu Current Position: Instructor University of Colorado Colorado

More information

Promoting a cyber security culture and demand compliance with minimum security standards;

Promoting a cyber security culture and demand compliance with minimum security standards; Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute

More information

Oil & Gas Cybersecurity

Oil & Gas Cybersecurity COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry

More information

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR

C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer

More information

A Statewide Training Conference Agenda DOMESTIC VIOLENCE - Ending Violence: Assessing Victim Safety and Addressing Victims Needs

A Statewide Training Conference Agenda DOMESTIC VIOLENCE - Ending Violence: Assessing Victim Safety and Addressing Victims Needs A Statewide Training Conference Agenda DOMESTIC VIOLENCE - Ending Violence: Assessing Victim Safety and Addressing Victims Needs Sponsored by United States Attorneys for the Eastern, Middle, and Western

More information

Security Intelligence Services. www.kaspersky.com

Security Intelligence Services. www.kaspersky.com Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats

More information

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016

Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral

More information

FORUM BROCHURE & SPONSORSHIP PACK. Business networking and workshops. Kinshasa - DRC. > www.africarise.be

FORUM BROCHURE & SPONSORSHIP PACK. Business networking and workshops. Kinshasa - DRC. > www.africarise.be FORUM BROCHURE & SPONSORSHIP PACK Business networking and workshops Kinshasa - DRC Organized by: Official partners: > www.africarise.be The Forum in a few words ORGANIZER > Africa Rise OFFICIAL PARTNERS

More information

The Information Law Institute, NYU and the Center for Information Technology Policy, Princeton University present. A Workshop on Spyware

The Information Law Institute, NYU and the Center for Information Technology Policy, Princeton University present. A Workshop on Spyware The Information Law Institute, NYU and the Center for Information Technology Policy, Princeton University present Organizers: Ed Felten, Princeton University Helen Nissenbaum, New York University A Workshop

More information

Keeping New Zealand s Economy Cyber Secure

Keeping New Zealand s Economy Cyber Secure Keeping New Zealand s Economy Cyber Secure CYBER SECURITY SUMMIT 5 May 2016 MINISTERIAL FOREWORD Kia ora and welcome to New Zealand s first ever Cyber Security Summit. We can all agree that cyber security

More information

EDUCATIONAL OFFER _ LUCIAN BLAGA UNIVERSITY OF SIBIU. Doctorate. Theology

EDUCATIONAL OFFER _ LUCIAN BLAGA UNIVERSITY OF SIBIU. Doctorate. Theology EDUCATIONAL OFFER _ LUCIAN BLAGA UNIVERSITY OF SIBIU FACULTY OF THEOLOGY http://teologie.ulbsibiu.ro/ Pastoral Theology Orthodox Theology Social assistance Historical Theology Practical Theology Systematic

More information

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department

CYBER SECURITY. Marcin Olender Head of Unit Information Society Department CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November

More information