HOTEL RAMADA,
|
|
- Kristopher Murphy
- 8 years ago
- Views:
Transcription
1 HOTEL RAMADA, , 09:00-13:00 Pre-congress workshop "THE BASICS OF IT SECURITY" Neutral and open initiations for Individuals and SME's , 14:00 Congress Official Opening , 15:00-17:45 Plenary session , 17:45-18:45 Real hacking demonstration, by Bitdefender team , 09:00-17:30 Plenary session , 17:30-18:30 Congress conclusions
2 25th of September, morning : "THE BASICS OF IT SECURITY" SPECIAL WORKSHOP MORNING for Individuals and SME's Registration : 08:00; starting 09:00 am 25th of September : FIRST SESSION, 09:00 pm - 10:30 pm Mauro Vignati, Federal Intelligence Service, Switzerland, MELANI reporting centre Case Study Switzerland: Organized Economic Crime Philippe Joliot, President, TRACIP and Senior expert at the Nancy Court of Justice Cyber investigation : an innovative solution for Companies Paolo Dal Checco, expert witness, court-appointed technical advisor with ongoing roles of Computer Forensics Analyst and Examiner for attorneys, Law Enforcement Officers and private citizens Mobile Forensics with Closed and Open Source Tools : a good investment for Companies Andrea Zapparoli Manzoni, Senior expert in ICT security, Clusit (Information Security Italian Association) Major Cyber Threats to SMEs, future Trends and Countermeasures Mattia Epifani, digital forensics specialist for judges, prosecutors, lawyers and private companies, both as Court Witness Expert and Digital Forensics Expert, Genova Mobile risks and countermeasures for Companies 25th of September : COFFEE BREAK, 10:30 pm - 11:00 pm 25th of September : SECOND SESSION, 11:00 pm - 13:00 pm Isabelle Augsburger-Bucheli, Dean and Professor at the ILCE (Institute for Economic Crime Investigation), Neuchâtel, Switzerland The fight against cybercrime in a company: the significant role of the human factor Romain Roubaty, Professor at the ILCE (Institute for Economic Crime Investigation), Neuchâtel, Switzerland Minimal cyber-prevention requirements for Small and Medium Companies Catalin Cosoi, Cyber Security Strategist, Bitdefender Romania How can a company target today s security threats, but also defend against zero-day attacks? Romain Roubaty & Bitdefender team, Practical demonstrations of Hardware and Software Intrusions
3 WELCOME ADRESSES 25th of September: OFFICIAL OPENING OF THE CONGRESS, 14:00 pm H.E. Jean-Hubert LEBET Ambassador of Switzerland to Romania Marco OBISO World Coordinator for Cyber Security, International Telecommunications Union (UNO-GENEVA) Iulian FOTA Counsellor to the President of Romania, Head of the National Security Department Ioan-Ovidiu SITTERLI Prefect of Sibiu Ioan CINDREA President of the County Council of Sibiu Prof. Dr. Ing. Ioan BONDREA Rector of the 'Lucian Blaga' University of Sibiu Cristina UNGUREANU Director, Chamber of Commerce Switzerland-Romania Eugen IORDANESCU Director, Chamber of Commerce, Industry and Agriculture, Sibiu Jörg PROHASZKA Director, Deutscher Wirtschaftsklub Siebenbürgen Daniela CHRZANOVSKI, Laurent CHRZANOVSKI, Ionel NITU, Dorel SANDOR Organizers
4 25th of September : FIRST SESSION, 15:00 pm - 16:10 pm Florin TALPES, CEO, Bitdefender Foreword. Dumitru COCORU, Mr. General, deputy director, SRI Foreword Iulian FOTA, Counsellor to the President of Romania, Head of the National Security Department Introductory Speech Marco OBISO, World Coordinator for Cyber Security, International Telecommunications Union (UNO-GENEVA) Toward a global approach on Cybersecurity Mauro VIGNATI, Chief Analyst, Federal Intelligence Service, Switzerland, MELANI reporting centre The Private Public Partnership and the National Cyber Strategy: how to work together for reducing cyber risks Adrian Ionuţ AXINIA, Chief of the Direction for Information Technology, Service of Special Transmission A model of information exchanges between units of CERT-type 25th of September : COFFEE BREAK, 16:00 pm - 16:30 pm 25th of September : SECOND SESSION, 16:30 pm - 17:45 pm Sorin ENCUTESCU, Counsellor to the Prime Minister of Romania for National Security Matters and President of the Inter-ministerial Committee for Evaluation of the State of the Security Industry Foreword Mircea CAZAN, Deputy of Sibiu, Parliament of Romania, IT Commission For a cyber-secured Sibiu. Florin COSMOIU, SRI (Romanian Intelligence Service), Head of CYBERINT National Centre Cyber Intelligence the Change of the National Security Paradigm Eduard BISCEANU, Deputy General Director, CERT : Romanian National Security Incident Response Team Statistics and conclusions of cyber security incidents in the firsts 6 months of 2013 and trends of cyber security issues in Romania.
5 Radu STANESCU, CEO and Founder, Sandline - an IT Security company focused on penetration testing and consultancy services Cyber Security in the era of Cyber War and Cyber Espionage Isabelle AUGSBURGER-BUCHELI, Dean and Professor at the ILCE (Institute for Economic Crime Investigation), Neuchâtel, Switzerland The fight against cybercrime in a company: the significant role of the human factor 25th of September : FROM THE OTHER SIDE OF THE WALL (1), 17:45 pm - 18:45 pm Cătălin COSOI, Chief Security Strategist, Bogdan BOTEZATU, Senior ethreat Analyst, Bitdefender Hacking demonstration. 25th of September : COCKTAIL AT THE CITY HALL, 19:00 pm Welcome speech by Klaus Werner IOHANNIS Mayor of Sibiu Address by H.E. Jean-Hubert LEBET Ambassador of Switzerland to Romania Social media heroes and victims, yesterday and today : two words about the exhibition Laurent Chrzanovski & Swiss Webacademy Team 25th of September : OFFICIAL DINNER, HOTEL RAMADA, 20:45 pm Welcome speech by Bogdan DUMITRU CTO, Bitdefender
6 26th of September : FIRST SESSION, 09:00 am - 10:45 am Gabriel SERVAN, Professor at "Lucian Blaga" University, Sibiu. Short presentation of the series "Studia Securitatis", where the Acts of the Congress will be published as a special monograph Ioana VASIU, Professor at the Faculty of Law, Babeş-Bolyai University and Director for International Affairs of Paul Negulescu Institute of Administrative Sciences, Sibiu. User-Generated Content Websites, A Profitable Medium for Cybercriminals Valerian VREME, Deputy, Parliament of Romania, IT Commission Cyber in a Social (Connected) World. Andrea ZAPPAROLI MANZONI, Senior expert in ICT security & Founder, Security Brokers, a team of Cyber Security Experts from all over the world, that focuses on highly critical, strategic ICT Security and Cyber Defense issues From Social Media Chaos to Social Business Security Latif LADID, President, IPv6 Forum, Professor at the University of Luxemburg and Chair of multiple EU and EC Commissions on the thematic The New Internet Based on IPv6 and the new Internet Vulnerabilities. Paolo DAL CHECCO, member of IISFA Italian Chapter association and founder of the DEFT Association, formerly known as DEFT Linux Project; expert witness, court-appointed technical advisor with ongoing roles of Computer Forensics Analyst and Examiner for attorneys, Law Enforcement Officers and private citizens Mobile Forensics with Closed and Open Source Tools : a good investment for Companies 26th of September : COFFEE BREAK, 10:45 pm - 11:15 am 26th of September : SECOND SESSION, 11:15 am - 13:00 pm Mattia EPIFANI, digital forensics specialist for judges, prosecutors, lawyers and private companies, both as Court Witness Expert and Digital Forensics Expert, Genova Mobile risks and countermeasures for Companies Romain ROUBATY, Professor at the ILCE (Institute for Economic Crime Investigation), Neuchâtel, Switzerland Minimal cyber-prevention requirements for Companies Razvan-Cosmin GRIGORESCU, President of the IT & C Security Commission of the Romanian Banking Association, Information Security Manager & CISO CEC BANK SA, Data loss a daily menace... Bogdan-Mihai ZAMFIR, CISM, C CISO, Head of ICT Security, UniCredit Tiriac Bank ICT Security challenges in Banking Razvan Macovei, Director, Head of Operational, Information and Security Risk Management, ING BANK Cyber Threats in digital era banking. Practical considerations Cristian TOMA, Associate Professor, Department of Economic Informatics and Cybernetics - D.I.C.E/D.E.I.C, Faculty of Cybernetics, Statistics and Economic Informatics - C.S.I.E/C.S.E.I, Bucharest University of Economic Studies Mobile Payments Security Issues Overview
7 26th of September : BUFFET LUNCH, 13:00 pm - 14:00 pm 26th of September : THIRD SESSION, 14:00 pm - 15:45 pm Liviu FLESAR, penetration tester, NETSEC Web Security: beyond appearances Alexandru Catalin COSOI, Chief Security Strategist, Bitdefender Evaluating the fitness of cyber-security strategies Adriean PARLOG, MG (Ret.), Associate professor at the National Defence College and guest professor at Lucian Blaga University Sibiu Order in the virtual world Ciprian PUSTIANU, Technology Senior Sales Consultant, Oracle Romania Cybersecurity strategy for evolving threats Ionel NITU, Independent analyst, Executive Director at Intergraph Computer Services, President of ASIA Bogdan ALDEA, Chief of the Development Office, VP Holding The Probability of a Cyber Attack and its Impact on Business Environment Dan PREISZ, Public Sector, Public Security and Competitive Intelligence manager for the Romanian branch of SAP SAP Cyber intelligence analysis platform : a presentation 26th of September : COFFEE BREAK, 15:45 pm - 16:15 pm 25th of September : FROM THE OTHER SIDE OF THE WALL (2), 16:15 pm - 16:45 pm Romain ROUBATY, Professor at the ILCE (Institute for Economic Crime Investigation), Neuchâtel, Switzerland Practical exemples of hardware intrusion 26th of September : FOURTH SESSION, 16:45 pm - 17:30 pm Philippe JOLIOT, President, TRACIP and Senior expert at the Court of Justice of Nancy Cyber investigation : an innovative solution for Companies Bogdan DUMITRU, CTO, Bitdefender Romania Viorel CANJA, Head of Antimalware and Antispam Labs Today's security Challenges. 26th of September : CONCLUSIONS, 17:30 pm - 18:30 pm Organizers Farewell Speech 26th of September : OPTIONAL DINNER, ASTRA OPEN AIR MUSEUM (optional) Welcome speech by Valeriu OLARU, Director, NATIONAL MUZEAL COMPLEX "ASTRA"
8 Special events for participants , 19:00 Cocktail at the Sibiu City Hall Welcome by the Mayor of Sibiu, Klaus Werner Iohannis Address by the Ambassador of Switzerland to Romania, H.E. Jean-Hubert Lebet Opening of the exhibition "Social Media Heroes, Social Media Victims"
09:00 Official Opening 09:00 - Marco Obiso, ITU/UN-Geneva, World cybersecurity coordinator - H.E. Jean-Hubert Lebet, Ambassador of Switzerland to
DAY 1 09:00 Official Opening 09:00 - Marco Obiso, ITU/UN-Geneva, World cybersecurity coordinator - H.E. Jean-Hubert Lebet, Ambassador of Switzerland to Romania - Ovidiu Sitterli, Prefect of Sibiu - Constantin
More informationCYBERSECURITY IN ROMANIA - DRAFT PROGRAMME -
CYBERSECURITY IN ROMANIA - DRAFT PROGRAMME - SECURITY TRAINING DAYS Monday 21 September Wednesday 23 September 2015 AWARENESS DAY Wednesday, 23 September 2015 LIVE DEMONSTRATIONS, CONGRESS 1 st DAY Thursday,
More informationSCHEDULE. The 7 th International Conference on Security for Information Technology and Communications (SECITC'14)
SCHEDULE of The 7 th International Conference on Security for Information Technology and Communications (SECITC'14) Powered by Informatics Security / IT&C Security Master Bucharest University of Economic
More informationDay 3-24 April 2013. Day 2-23 April 2013
Day 1-22 April 2013 09.00 Joint International Telecommunications Union (ITU) & Commonwealth Telecommunications Organisation (CTO) project to implement Child Online Protection: Workshop for Cameroon Kim
More informationCONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
More informationCybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI
Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI UNICRI s Main Goals The United Nations Interregional Crime and
More informationCYBER INTELLIGENCE EUROPE 28 th 30 th September 2015 Bucharest, Romania
CYBER INTELLIGENCE EUROPE 28 th 30 th September 2015 Bucharest, Romania ORGANISED BY: Sponsors & Exhibitors Speakers Include: Bebe-Viorel Ionica, Secretary of State, Ministry of Information Communication
More informationCYBERSECURITY. PROGRAMME 14 April 2015. 13.00 14.00 Lunch / Delegates Registration
PROGRAMME 14 April 2015 13.00 14.00 Lunch / Delegates Registration 14.00 14.10 Opening and Keynote by Panel Chair Getting Ahead of the Threat: Building Cybersecurity Dr Madan Oberoi Director, Cyber Innovation
More informationGEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT
GEORGETOWN UNIVERSITY MASTER OF SCIENCE IN FOREIGN SERVICE CYBERPROJECT INTERNATIONAL CONFERENCE ON CYBER ENGAGEMENT: ENHANCING COOPERATION ACROSS DIGITAL BORDERS Monday, April 27, 2015 8:00 a.m. 6:30
More informationCouncil of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones. Tbilisi 28-29, September 2009
Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current
More informationCybersecurity Market Profile [1] - Romania
Cybersecurity Market Profile [1] - Romania March 2014 Produced by the Canadian Trade Commissioner Service 1. Sector Overview Value of imports and exports In total Romanian Gross Domestic product for 2013
More informationICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness
ICSS2015: International Cyber Security Strategy Congress: Cyber Security and Forensic Readiness Pre-Congress B-CCENTRE Workshop 3 February 2015 9:00 09:30 WELCOME COFFEE 9:30 10:00 Welcome and Introduction:
More informationCyber Risk and Insurance What companies need to know
Supported by The Security Institute Cyber Risk and Insurance What companies need to know Organised by Produced by Central London Supported by About the Conference Who should attend Estimates as to the
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationMaritime Security Conference. The Challenges, Benefits and Opportunities of the European Union Maritime Security Strategy
REPUBLIC OF CYPRUS MINISTRY OF DEFENCE Maritime Security Conference (12-13 November 2015, Nicosia, Cyprus) The Challenges, Benefits and Opportunities of the European Union Maritime Security Strategy The
More informationRAISA Romanian Association for Information Security Assurance PURPOSE OBJECTIVES
RAISA Romanian Association for Information Security Assurance is a professional, non-governmental, non-partisan political, nonprofit and public benefit association. PURPOSE The aim of Romanian Association
More informationRomanian National Computer Security Incident Response Team CERT-RO. dan.tofan@cert-ro.eu http://www.cert-ro.eu
Romanian National Computer Security Incident Response Team CERT-RO dan.tofan@cert-ro.eu http://www.cert-ro.eu About A Digital Agenda for Europe, Pillar : Trust and Security, Action 38 Member States to
More informationHow To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
More informationU. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
More informationTRANSATLANTIC CYBER SECURITY SUMMIT
TRANSATLANTIC CYBER SECURITY SUMMIT November 27-28, 2012 Dublin, Ireland TRANSATLANTIC CYBER SECURITY SUMMIT Tuesday, November 27th Wednesday, November 28th INTRODUCTION: Mr. Tom McDermott OPENING KEYNOTE:
More informationITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests
ITU National Cybersecurity/CIIP Self-Assessment Toolkit Background Information for National Pilot Tests This document provides background information for pilot tests of the ITU National Cybersecurity/CIIP
More informationAGENCY: International Trade Administration, Department of Commerce.
This document is scheduled to be published in the Federal Register on 09/30/2014 and available online at http://federalregister.gov/a/2014-23210, and on FDsys.gov DEPARTMENT OF COMMERCE International Trade
More informationPrivacy in the Digital Age of Encryption and Anonymity Online
The Hague (NL), 19-20 May 2016 ACCESSING FILES. ACCESS DENIED! DATA ENCRYPTED. TARGET GROUP This conference is open to anyone who is dealing with privacy and security in an online environment. Europol
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationCyber Stability 2015 Geneva, 09 July 2015. African Union Perspectives on Cybersecurity and Cybercrime Issues.
Cyber Stability 2015 Geneva, 09 July 2015 African Union Perspectives on Cybersecurity and Cybercrime Issues. FACTS AND FIGURES As African countries increase access to broadband Internet, issues relating
More informationTURNING THE RISING TIDE OF CYBERSECURITY THREATS
TURNING THE RISING TIDE OF CYBERSECURITY THREATS With cyber attacks on the rise, there s a growing need for digital forensic professionals with the knowledge and skills to investigate technology crimes
More informationStrategy Advisory Group SA. Corporate Training. Information Security Awareness Program 1
IT & IP Strategy Advisory Group SA Corporate Training Information Security Awareness Program 1 March 2011 - SONY : Over 100 million stolen personal data September 2011 - Mitsubishi Heavy Industries : At
More informationPatrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie. Developments in Security Regulation
Patrick Fair Partner, ITC and Data Security Specialist Baker & McKenzie Developments in Security Regulation Agenda Introduction PM & C Cybersecurity Review Mandatory Data Retention Legislation Overview
More informationNational Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
More informationCYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015
BACKGROUND CYBER SECURITY, INTELLIGENCE AND AWARENESS COURSE PARK HOTEL THE HAGUE THE HAGUE, NETHERLANDS 26-30OCTOBER 2015 On 26-30 October 2015 Lowlands Solutions Netherlands (LSN) will be presenting
More informationCyber crime risk management protecting your business 4 November 2015
Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC
More informationJune 4 th to 6 th, 2012. Plenary 2 - Annex II - Chamber of Deputies Brasilia, Brazil
June 4 th to 6 th, 2012 Plenary 2 - Annex II - Chamber of Deputies Brasilia, Brazil Support: Realization: Background The Regional Workshop Connected Parliaments - Introduction to Legislative XML, is being
More informationThe global challenge
The global challenge CYBERCRIME The global challenge Cybercrime has developed from an emerging crime to a serious manifestation of crime with great practical relevance With the emerging use of computer
More information20th Council of Europe Conference of Directors of Prison and Probation Services. 9-10 June 2015 Bucharest, Romania
12/06/2015 20th Council of Europe Conference of Directors of Prison and Probation Services 9-10 June 2015 Bucharest, Romania RADICALISATION AND OTHER STRATEGIC CHALLENGES PROGRAMME www.coe.int/cdpps2015
More informationCritical Infrastructure Protection in Germany
ETH-ÖCB-CRN Workshop Critical Infrastructure Protection in Europe Lessons Learned and Steps Ahead November 8-10, 2001 Critical Infrastructure Protection in Germany Dr. Susanne Jantsch IABG mbh, Dept. IT
More informationForensics Europe Expo 2015 Conference Programme
Book before 20 February 2015 to save up to 20% Forensics Europe Expo 2015 Conference Programme The Only Dedicated International Forensics Exhibition and Conference The Meeting Place for Professionals Involved
More informationGood morning. It s a pleasure to be here this morning, talking with the NZISF. Thank you for this opportunity.
Speech Notes for New Zealand Information Security Forum 11 April 2013 Paul Ash, Manager National Cyber Policy Office Department of Prime Minister and Cabinet CYBERSECURITY: WHY IT MATTERS FOR NEW ZEALAND
More informationCyber Security Strategy
NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use
More informationCybersecurity and the Romanian business environment in the regional and European context
KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory
More informationMiddle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
More informationTempus Regional Seminar on Human Resource Management In Higher Education
TEMPUS Programme Tempus Regional Seminar on Human Resource Management In Higher Education Western Balkans Sarajevo 14th - 15th June 2012 PROGRAMME http://eacea.ec.europa.eu/tempus PROGRAMME "Tempus Regional
More informationFINAL // FOR OFFICIAL USE ONLY. William Noonan
FINAL // FOR OFFICIAL USE ONLY William Noonan Deputy Special Agent in Charge United States Secret Service Criminal Investigative Division Cyber Operations Branch Prepared Testimony Before the United States
More informationProgramme. 8.30am. 10.40am
8.30am 9.00am 9.15am 9.35am 9.40am 8.30am 10.10am 10.40am 11.10am 11.35am 12.00pm 12.25pm 1.40pm 2.05pm 2.30pm 2.55pm 3.25pm 3.50pm 4.15pm Programme Registration Welcome Address Mr Lau Thiam Beng Deputy
More informationInformation Security Summit 2005
Information Security Summit 2005 Forensically Sound Information Security Management in a Risk Compliance Era Keynote Opening Address by Mr. Howard C Dickson Government Chief Information Officer Government
More informationCyber Security Awareness Workshop
December 5, 2012 War Memorial Building, Balboa Park Participant Guide The San Diego Cyber Security Threat Awareness Response and Recovery Program (C-STARR) is hosted by the City of San Diego and the Securing
More informationAGENDA. Food Contact Materials: Working Together for Safety and Innovation in Europe
AGENDA Food Contact Materials: Working Together for Safety and Innovation in Europe Page 2 Conference Food contact materials: working together for safety and innovation in Europe 30 th September 2015 Luxembourg,
More informationNew challenges in Data privacy.
New challenges in Data privacy. Zdravko Stoychev, CISM CRISC Information Security Officer Alpha Bank Bulgaria branch South East European Regional Forum on Cybersecurity and Cybercrime, 2013 11-13 Nov 2013
More informationALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage
ALM Virtual Corporate Counsel Managing Cybersecurity Risks and Mitigating Data Breach Damage VENABLE LLP Attorneys at Law Washington, DC/New York/San Francisco/Los Angeles/Baltimore/Virginia/Delaware November
More informationCyber Diplomacy A New Component of Foreign Policy 6
Cyber Diplomacy A New Component of Foreign Policy 6 Assistant Lecturer Dana DANCĂ, PhD. candidate Titu Maiorescu University, Bucharest dana.danca@yahoo.com Abstract Nowadays, the boundary between virtual
More informationNATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
More informationIntroduction to Cybersecurity Overview. October 2014
Introduction to Cybersecurity Overview October 2014 Introduces the importance of cybersecurity and current trends Eight modules with presentations and panel discussions that feature industry experts Activities,
More informationCybercrime & Cybersecurity: the Ongoing Battle International Hellenic University
Cybercrime & Cybersecurity: the Ongoing Battle International Hellenic University Andreas Athanasoulias, CISM, CISSP Information Security Officer & Security Consultant Brief introduction My career path
More informationNIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin, MoFo
2014 Morrison & Foerster LLP All Rights Reserved mofo.com NIST Cybersecurity Framework Impacting Your Company? April 24, 2014 Presented By Sheila FitzPatrick, NetApp Jeff Greene, Symantec Andy Serwin,
More informationInfoSec Academy Application & Secure Code Track
Fundamental Courses Foundational Courses InfoSec Academy Specialized Courses Advanced Courses Certification Preparation Courses Certified Information Systems Security Professional (CISSP) Texas Security
More informationThe 2012/3 SA Cyber Threat Barometer. Craig Rosewarne
The 2012/3 SA Cyber Threat Barometer Craig Rosewarne An improved cyber security framework for South Africa Research - Initiatives South Africa (Pty) Ltd Stakeholder Risk Management / Alignment to business
More informationRoadmap for new Cyber security education in ME
Deliverable 1.4 Roadmap for new Cyber security education in ME European Commission Tempus Project: This project has been funded with support from the European Commission. This publication reflects the
More informationDeveloping a Mature Security Operations Center
Developing a Mature Security Operations Center Introduction Cybersecurity in the federal government is at a crossroads. Each month, there are more than 1.8 billion attacks on federal agency networks, and
More informationCyber Security in the Financial Industry
Supported by Cyber Security in the Financial Industry The SWIFT Institute and the KU Leuven will host a one day conference focusing on cyber security issues impacting the global financial industry. Today
More information22 ND ANNUAL REVIEW OF THE FIELD
22 ND ANNUAL REVIEW OF THE FIELD OF NATIONAL SECURITY LAW CO-SPONSORED BY THE AMERICAN BAR ASSOCIATION STANDING COMMITTEE ON LAW AND NATIONAL SECURITY CENTER FOR NATIONAL SECURITY LAW, UNIVERSITY OF VIRGINIA
More informationConference. Shared histories for a Europe without dividing lines"
Strasbourg, 1 st April 2014 Conference Shared histories for a Europe without dividing lines" Vienna, 9-10 April 2014 Conference organised in co-operation with Vienna University in the framework of the
More informationOWL CROSS DOMAIN FORUM
Owl Computing Technologies R WELCOME TO THE 9TH ANNUAL OWL CROSS DOMAIN FORUM MAY 8, 2013 www.owlcti.com AGENDA 0800-1700 Demonstration room exhibits 0800-0900 Continental breakfast 0900-1000 Owl new technology
More informationCyber Security @ ITU. By Tomas Lamanauskas, ITU
Cyber Security @ ITU By Tomas Lamanauskas, ITU ITU Overview Founded in 1865 UN Specialized Agency for ICTs HQs in Switzerland 4 Regional Offices & 7 Area Offices 193 Member States; 750 Sector Members and
More informationCyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?
Cyber Warfare David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP Global Economic Crime Survey Cyber crime is the fastest growing economic crime up more than 2300% since 2009 1 in 10 companies
More informationMULTI ANNUAL WORK PLAN 2013 2015
MULTI ANNUAL WORK PLAN 2013 2015 Translation into English: Elena Arrebola 1. CONTEXT a) Mandate The Council promotes the principle of equal treatment and non-discrimination of persons on racial or ethnic
More informationCYBER LIABILITY RISKS SEMINAR Programme overview. THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading
CYBER LIABILITY RISKS SEMINAR Programme overview THURSDAY 1 OCTOBER 2015 8.30am 1.00pm Green Park Conference Centre, Reading JLT Specialty (JLT) would like to invite you to a highly informative technical
More informationLessons from Defending Cyberspace
Lessons from Defending Cyberspace The Challenge of Addressing National Cyber Risk Andy Purdy Workshop on Cyber Security Center for American Studies, Christopher Newport College 10 28-2009 Cyber Threat
More informationReport on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
More informationINTERNATIONAL ENGAGEMENT ON CYBER: DEVELOPING INTERNATIONAL NORMS FOR A SAFE, STABLE & PREDICTABLE CYBER ENVIRONMENT
Georgetown University Institute for Law, Science and Global Security INTERNATIONAL ENGAGEMENT ON CYBER: DEVELOPING INTERNATIONAL NORMS FOR A SAFE, STABLE & PREDICTABLE CYBER ENVIRONMENT Tuesday, March
More informationCommonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
More informationU.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY. +$106.8 Million in Program Increases. FY 2016 Overview
U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department
More informationEl Camino College Homeland Security Spring 2016 Courses
El Camino College Homeland Security Spring 2016 Courses With over 250,000 federal positions in Homeland Security and associated divisions, students may find good career opportunities in this field. Explore
More informationThe UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
More informationSpeakUp. Conference. 22 October 2015 Cleopatra Hotel Nicosia, Cyprus
SpeakUp Conference 22 October 2015 Cleopatra Hotel Nicosia, Cyprus General Information ORGANISER: Transparency International Cyprus Transparency International Cyprus (TI-C) has been established in 2011,
More informationWednesday, March 11, 2015 8:00am to 4:30pm. Seats are filling fast, sign up today!
EVENT NOTICE Making the Business Case for Cybersecurity & Public-Private Sector Cooperation Wednesday, March 11, 2015 8:00am to 4:30pm Presented by: ISACA - Greater Hartford Chapter Guest Speaker: Judith
More informationWhat legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : b.zouari@ansi.tn
More informationBOARD OF GOVERNORS MEETING JUNE 25, 2014
CYBER RISK UPDATE BOARD OF GOVERNORS MEETING JUNE 25, 2014 EXECUTIVE SUMMARY Cyber risk has become a major threat to organizations around the world, as highlighted in several well-publicized data breaches
More informationSECURING YOUR ENTERPRISE MOBILITY
SECURING YOUR ENTERPRISE MOBILITY STRATEGY, OPERATION & TECHNOLOGY INTERACTIVE TRAINING WORKSHOP Burj Al Arab, Dubai th th th 16, 17 & 18 March 2015 ABOUT LUCIDEUS Lucideus is a cyber space security leader
More informationPERSONAL DATA: Born on 26 October 1954, Ponor commune, Alba County, Romania.
VICTOR CIORBEA PERSONAL DATA: Born on 26 October 1954, Ponor commune, Alba County, Romania. NATIONALITY: Romanian CITIZENSHIP: Romanian ADDRESS: Intrarea Valului St., no.14, Sector 1, Bucharest, Romania.
More informationMEETING THE NATION S INFORMATION SECURITY CHALLENGES
MEETING THE NATION S INFORMATION SECURITY CHALLENGES TO ADDRESS SKILLS AND WORKFORCE SHORTAGES IN THE INFORMATION SECURITY INDUSTRY, THE NATIONAL SECURITY AGENCY AND THE DEPARTMENT OF HOMELAND SECURITY
More informationPanel on Emerging Cyber Security Technologies. Robert F. Brammer, Ph.D., VP and CTO. Northrop Grumman Information Systems.
Panel on Emerging Cyber Security Technologies Robert F. Brammer, Ph.D., VP and CTO Northrop Grumman Information Systems Panel Moderator 27 May 2010 Panel on Emerging Cyber Security Technologies Robert
More informationCYBER SECURITY SPECIALIZATION. Dr. Andreas Peter Services, Cyber Security, and Safety Group
1 CYBER SECURITY SPECIALIZATION Dr. Andreas Peter Services, Cyber Security, and Safety Group 2 CYBER SECURITY Why Cyber Security? Our world increasingly becomes digital and connected Cyber Security is
More informationCyber Security Strategy of Georgia
Cyber Security Strategy of Georgia 1 1. Introduction The Government of Georgia publishes its Cyber Security Strategy for the first time. Large-scale cyber attacks launched by Russia against Georgia in
More informationBuilding Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch
Building Blocks of a Cyber Resilience Program Monika Josi monika.josi@safis.ch About me Chief Security Advisor for Microsoft Europe, Middle East and Africa providing support to Governments and CIIP until
More informationExecutive Cyber Security Training. One Day Training Course
Executive Cyber Security Training One Day Training Course INTRODUCING EXECUTIVE CYBER SECURITY TRAINING So what is all this we hear in the media about cyber threats? How can an organization understand
More informationWorking with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
More informationDraft Program. Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on
Europe and the Global Information Society Revisited Developing a network of scholars and agenda for social science research on CYBER SECURITY Central European University, Budapest http://www.cmcs.ceu.hu/cybersecurity/main
More informationCapacity Building to Strengthen Cybersecurity: Thailand Update
Capacity Building to Strengthen Cybersecurity: Thailand Update ASEAN Regional Forum Workshop on Measures to Enhance Cyber Security Legal and Cultural Aspects September 11-12, 2013 1 1 Chain is only as
More informationResume. Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918. University of Colorado Colorado Springs, Colorado
Resume Name: Address: Michael E. Martinez 1420 Austin Bluffs Parkway Colorado Springs, Colorado 80918 Contact Information:mmartin8@uccs.edu Current Position: Instructor University of Colorado Colorado
More informationPromoting a cyber security culture and demand compliance with minimum security standards;
Input by Dr. S.C. Cwele Minister of State Security, Republic of South Africa Cyber Security Meeting, Johannesburg 27 March 2014 I would like to thank the Wits School of Governance for inviting us to contribute
More informationOil & Gas Cybersecurity
COurse Oil & Gas Cybersecurity Best Practices & Future Trends Sheraton Pentagon City Hotel Supporting Organization is authorized by IACET to offer 0.6 CEUs for the course. 1 Overview The energy industry
More informationC HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge skills in computer
More informationA Statewide Training Conference Agenda DOMESTIC VIOLENCE - Ending Violence: Assessing Victim Safety and Addressing Victims Needs
A Statewide Training Conference Agenda DOMESTIC VIOLENCE - Ending Violence: Assessing Victim Safety and Addressing Victims Needs Sponsored by United States Attorneys for the Eastern, Middle, and Western
More informationSecurity Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
More informationGeorgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016
Georgia Tech Cybersecurity Leadership Certificate Program July 25 29, 2016 Preliminary Program Schedule The Georgia Tech Cybersecurity Leadership Certificate Program is presented with the guidance of Admiral
More informationFORUM BROCHURE & SPONSORSHIP PACK. Business networking and workshops. Kinshasa - DRC. > www.africarise.be
FORUM BROCHURE & SPONSORSHIP PACK Business networking and workshops Kinshasa - DRC Organized by: Official partners: > www.africarise.be The Forum in a few words ORGANIZER > Africa Rise OFFICIAL PARTNERS
More informationThe Information Law Institute, NYU and the Center for Information Technology Policy, Princeton University present. A Workshop on Spyware
The Information Law Institute, NYU and the Center for Information Technology Policy, Princeton University present Organizers: Ed Felten, Princeton University Helen Nissenbaum, New York University A Workshop
More informationKeeping New Zealand s Economy Cyber Secure
Keeping New Zealand s Economy Cyber Secure CYBER SECURITY SUMMIT 5 May 2016 MINISTERIAL FOREWORD Kia ora and welcome to New Zealand s first ever Cyber Security Summit. We can all agree that cyber security
More informationEDUCATIONAL OFFER _ LUCIAN BLAGA UNIVERSITY OF SIBIU. Doctorate. Theology
EDUCATIONAL OFFER _ LUCIAN BLAGA UNIVERSITY OF SIBIU FACULTY OF THEOLOGY http://teologie.ulbsibiu.ro/ Pastoral Theology Orthodox Theology Social assistance Historical Theology Practical Theology Systematic
More informationCYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
More information