CYBER SECURITY TOM ILUBE, CEO



Similar documents
The cyber security challenge is growing rapidly and spend on cyber security is increasing.

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Cybersecurity. Are you prepared?

Crossword Cybersecurity plc (Incorporated in England and Wales with registered number ) (the Company or Crossword )

Cyber Security. CYBER SECURITY presents a major challenge for businesses of all shapes and sizes. Leaders ignore it at their peril.

Common Data Breach Threats Facing Financial Institutions

CYBERSTRAT IS PART OF GMTL LLP, 26 YORK STREET, LONDON, W1U 6PZ, UNITED KINGDOM

Presidential Summit Reveals Cybersecurity Concerns, Trends

the challenge our mission our advisors

DON T BE A VICTIM! IS YOUR ORGANIZATION PROTECTED FROM CYBERSECURITY THREATS?

Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)

Combating a new generation of cybercriminal with in-depth security monitoring

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

A New Security Publication About Risk and Security for Business Leaders. Sponsorship & Advertising Media Pack

BT Assure Threat Intelligence

CYSPA launch event - Turkey

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

Identifying Cyber Risks and How they Impact Your Business

NATIONAL CYBER SECURITY AWARENESS MONTH

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Small businesses: What you need to know about cyber security

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Compliance Doesn t Mean Security Achieving Security and Compliance with the latest Regulations and Standards

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Business Plan 2012/13

REPORT. Next steps in cyber security

Cyber Warfare. Global Economic Crime Survey. Causes of Cyber Attacks. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP. Why Cybercrime?

Who s Doing the Hacking?

Stop DDoS Attacks in Minutes

How To Protect Your Business From A Cyber Attack

How GCs And Boards Can Brace For The Cybersecurity Storm - Law360

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

CYBERSECURITY HOT TOPICS

How do we Police Cyber Crime?

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

WRITTEN TESTIMONY OF

Advanced Biometric Technology

Driving License. National Insurance Number

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Report on CAP Cybersecurity November 5, 2015

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Cyber Security Competency Center

U. S. Attorney Office Northern District of Texas March 2013

Department of Homeland Security

A Case for Managed Security

Small businesses: What you need to know about cyber security

FBI CHALLENGES IN A CYBER-BASED WORLD

Collateral Effects of Cyberwar

Secure by design: taking a strategic approach to cybersecurity

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

Auditing emerging cyber threats and IT controls

COMPANY INFORMATION DISCLOSURE

Executive Cyber Security Training. One Day Training Course

PREPARE YOUR INCIDENT RESPONSE TEAM

Cyber Security Strategy

Cyber Security - What Would a Breach Really Mean for your Business?

TLP WHITE. Denial of service attacks: what you need to know

Who s next after TalkTalk?

ISO27032 Guidelines for Cyber Security

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

Company Overview. Contact: Address: 6 The Mill Building, The Maltings, Bray, Co Wicklow. Web:

In an age where so many businesses and systems are reliant on computer systems,

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Cyber security: Are Australian CEOs sleepwalking or a step ahead? kpmg.com.au

CYBER SECURITY Audit, Test & Compliance

How To Protect Your Organisation From A Phishing Attack

I ve been breached! Now what?

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

Transcription:

CYBER SECURITY TOM ILUBE, CEO

Crossword Cybersecurity PLC We are a new, research driven cyber security company, publicly quoted on GXG, the European SME stock exchange Cyber security is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorised access Crossword s model is to establish long term relationships with leading European University cyber security centres of expertise Our specialist cyber security development team build solutions based on intellectual property from universities and our commercial team take these solutions to market though partnerships and direct to end user companies

Leadership with commercial, cybersecurity, IP transfer and public market expertise Tom Ilube, CEO Prof David Stupples Dr David Secher John Bottomley Former Managing Director Consumer Markets, Callcredit, major UK credit reference agency. CEO/Founder Garlik, venture-backed ID protection company sold to Experian. Chief Information Officer, Egg plc, UK s first internet bank. Ex Goldman Sachs, PwC, Cap Gemini, London Stock Exchange Chaired UK Government s Technology Strategy Board s Network Security Innovation panel. Member UN-agency ITU High Level Expert Group on Cybersecurity. World Economic Forum, Davos, Technology Pioneer 2008 Director, Centre for Cybersecurity Sciences, City University, London. Undertook research at the Royal Signal and Radar Establishment at Malvern followed by surveillance and intelligence systems research for the UK Government. Developed highly secure communications for surveillance satellites for Hughes Aircraft Corporation in the US. Employed in signals intelligence by the Royal Air Force. Senior Partner with PA Consulting Group responsible for the company's consultancy work on the design, build and operation of secure communications systems for Life Fellow at Gonville & Caius College, Cambridge. Expert in technology transfer and intellectual property. Chairman, PraxisUnico (2009-10). Chief Executive, N8 research Partnership (2006-2008), Director of Research Services, University of Cambridge (2000-2005), Director of Drug Development, Cancer Research Campaign (now Cancer Research UK) (1991-2000). Co-founder and Chairman (2002-2008) of Praxis Courses - the international technology transfer training programme. Queen's Award for Enterprise Promotion (2007) Recently retired as a partner of SGH Martineau Company Secretarial LLP. Has been company secretary to a number of AIM, fully listed public and private companies as well as holding a number of Non-Executive Directorships. John is a Fellow of the Institute of Chartered Secretaries and Administrators having qualified as a Chartered Secretary at PriceWaterhouseCooper s and has worked for a number of authorised institutions and property companies.

Cyber security challenge is growing Hackers accessed 128m ebay passwords, names, email addresses in what is probably one of the biggest data breaches in the history of the internet there is no longer any excuse for bosses who mishandle this area of their business. Companies must become far more serious about both preventing and tackling these risks (FT, 23 rd May 2014) [Heartbleed] a major security flaw at the heart of the internet may have been exposing users' personal information and passwords to hackers for the past two years one of the biggest security issues to have faced the internet to date. (BBC News, 10 th April 2014) Security experts estimate that there are about 50 million cyber attacks a year in the UK, a number which is growing rapidly and costing the UK economy up to 27bn a year. Cost to a large organisation of a security breach in UK is estimated to be in the range 450-850k. 93% of large organisations had a security breach last year Number of companies reporting cyber security concerns to US regulators has more than doubled in the past two years. Chrysler reported cyber attacks of increasing sophistication and frequency. (FT 21 st May, 2014)

A lot is being invested in UK cyber research Insider Threat Access Control 200+ UK Cyber security projects Trust & Reputation Big Data 150m grant money ~50 universities Internet of Things Network Protection Cloud Computing IDS 5

Let s talk about Cyber Security and Credit Reporting Bureaus

Why target credit reporting agencies? Because that s where the data is! Willie the Actor Sutton (1901-1980) was a prolific American bank robber When asked why he robbed banks he is reported to have said because that s where the money is In the digital age the most valuable commodity is personal data So, why do cybercriminals target credit reporting agencies? Because that s where the data is

Even the biggest players have been victims Equifax, Trans Union and Experian (March 2013) all reported intrusions into their systems following the revelation of personal data, including financial information of celebrities and prominent figures. A spokesman for Equifax, said that a hacker gained "fraudulent and unauthorized access" to at least four consumer credit reports at the credit reporting agency. Credit reports and sensitive data on First Lady Michelle Obama, former Secretary of State Hillary Clinton and FBI director Robert Mueller appeared on a website called Exposed. Experian (November 2014) experienced yet another security breach involving the compromise of a client s login credentials to their credit report database. The credentials were misused to obtain identity information on an unspecified number of consumers Social Security numbers, dates of birth, and/or account numbers.

Two types of cybercriminal The Fraudster and The Geek

We target people who are greedy and stupid

I love you, honey

Do you really know who I am? Fictional American cyber threat analyst, created by Thomas Ryan, Provide Security

The personal data you hold is a vital piece of the jigsaw

The hacker wants to place something nasty in your computer

There are markets for personal data

Big Bad Botnets Kehilos Storm Rustock ESTHost Conficker BredoLab Mariposa Waledac Coreflood Zeus

Are you ready for a full scale DDoS attack?

How do you tackle this growing challenge? Appoint and empower a CISO Chief Information Security Officer Include Cyber security in your risk assessment exercise Understand level of risk Prof Stupples City University risk models Co-operate on cyber security Credit Reporting agencies occupy a unique position

Crossword is running a cyber security programme in 2015 specifically for consumer credit reporting bureaus Q2 On-site Cyber security review Q3 Cyber risk assessment using proprietary tool Q4 2-day Cyber Security Seminar in London for CRBs only For further information please contact david.ross@crosswordcybersecurity.com

Thank You @crosswordcyber www.crosswordcybersecurity.com tom.ilube@crosswordcybersecurity.com