Cyber crime risk management protecting your business 4 November 2015



Similar documents
Energy Crisis solutions for business continuity October 2015

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Address C-level Cybersecurity issues to enable and secure Digital transformation

Addressing Cyber Risk Building robust cyber governance

CONSULTING IMAGE PLACEHOLDER

Microsoft s cybersecurity commitment

October 24, Mitigating Legal and Business Risks of Cyber Breaches

A NEW APPROACH TO CYBER SECURITY

Cyber security Building confidence in your digital future

Cybersecurity Strategic Consulting

Big 4 Information Security Forum

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Presidential Summit Reveals Cybersecurity Concerns, Trends

Cyber Risk and Insurance What companies need to know

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Cyber threat intelligence and the lessons from law enforcement. kpmg.com.au

Developing a robust cyber security governance framework 16 April 2015

Cyber security: Are consumer companies up to the challenge?

CYBER SECURITY TRAINING SAFE AND SECURE

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Mitigating and managing cyber risk: ten issues to consider

Cyber Security Evolved

Lessons from Defending Cyberspace

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Security & privacy in the cloud; an easy road?

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

Into the cybersecurity breach

Assessing the strength of your security operating model

Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014

Cybersecurity Framework: Current Status and Next Steps

INNOVATE. COLLABORATE. EDUCATE.

How To Understand And Understand The European Priorities In Information Security

Middle Class Economics: Cybersecurity Updated August 7, 2015

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

The battle to contain fraud is as old as

Promoting a cyber security culture and demand compliance with minimum security standards;

Bellevue University Cybersecurity Programs & Courses

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

JOB ANNOUNCEMENT. Chief Security Officer, Cheniere Energy, Inc.

Cybersecurity. Are you prepared?

THE WORLD IS MOVING FAST, SECURITY FASTER.

Information Governance Policy

The promise and pitfalls of cyber insurance January 2016

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

ISO27032 Guidelines for Cyber Security

Business Continuity for Cyber Threat

CyberSecurity Solutions. Delivering

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Cybersecurity y Managing g the Risks

How To Handle A Threat From A Corporate Computer System

DHS. CMSI Webinar Series

Rogers Insurance Client Presentation

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

How To Write An Article On The European Cyberspace Policy And Security Strategy

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Introduction to Cybersecurity Overview. October 2014

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

Corporate Perspectives On Cybersecurity: A Survey Of Execs

Managing cyber risks with insurance

Cybersecurity Delivering Confidence in the Cyber Domain

REPORT. Next steps in cyber security

TRANSATLANTIC CYBER SECURITY SUMMIT

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Law Firm Cyber Risk Conference: Addressing the Issues from the Top Down

North Texas ISSA CISO Roundtable

REGISTER AT IIF.COM/TRAINING

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

London Business Interruption Association Technology new risks and opportunities for the Insurance industry

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Honourable members of the National Parliaments of the EU member states and candidate countries,

Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda

Tackling fraud in the charity sector Making your money count

The enemies ashore Vulnerabilities & hackers: A relationship that works

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Transcription:

Cyber crime risk management protecting your business 4 November 2015 Programme genda (updated 26 Oct) 7.15 am 8.25 am Registration Networking breakfast sponsored by 8.25 am 8.30 am Welcome remarks by MC & moderator Chris Gibbons Journalist, Editor, Broadcaster & Trainer 8.30 am 9.00 am OPENING ADDRESS Evolving cyber threats in digital age and safeguarding your customers and your business Global, Africa and SA landscape on cyber attacks Identifying key threats and risks for businesses Who are the perpetrators now and future What are the costs and implications? Which industries and what type of business are most vulnerable? Managing your information security effectively New approaches to respond to growing challenges Gillian Duncan, Director - Cyber Security George Nicholls, Managing Director Control Risks Southern Africa 1

CORPORATE STORIES 9.00 am 9.20 am Information security and cyber resilience Taking the FUD (fear, uncertainty & doubt) out of IS and cyber practices Complementing and supporting the business strategy Julian Ramiah, Chief Information Security Officer Liberty Group 9.20 am 9.40 am Lessons learnt from a hacking incident Initial response what worked and what didn t New risk mitigation strategies governance, risk management and compliance Nicholas Harris, Senior Manager: Fraud Risk Management MTN 9.40 am 10.00 am Ask questions, get answers 10.00 am 10.30 am Refreshments & networking 2

RISK MANAGEMENT Effective cyber security risk management Best practices and lessons learnt Prevent, detect, defend and protect Latest risk management methods and technologies Aligning cyber security to governance, risk management and compliance processes Combining information and cyber security framework Appropriate controls to protect assets Fighting cyber crime and fraud with data analytics Storing data in cloud how safe is it? Using threat intelligence to increase value of security testing Quantifying the threat of cyber risks to business Mitigating and transferring risks Liabilities of businesses Are you underinsured for a cyber breach? 10.30 am 10.45 am Venisha Nayagar, Group Head : IT Governance, Risk and Cyber Security Sun International 10.45 am 11.00 am Kevin Hogan, Fraud Risk Manager Investec Bank 11.00 am 11.15 am Harry Grobbelaar, Managing Director MWR Infosecurity 11.15 am 11.30 am Kerry Curtin, Manager Financial Institutions AON South Africa 3

11.30 am 12.00 pm Ask questions, get answers 12.00 pm 12.25 pm ETHICAL HACKING Mastering the enemy s weapons and staying ahead of fraudsters Lawrence Munro, Director Trustwave SpiderLabs EMEA and APAC 12.25 pm 1.20 pm Networking lunch sponsored by 1.20 pm 1.25 pm Reflection and key takeaways Chris Gibbons Journalist, Editor, Broadcaster & Trainer DIGITAL FORENSICS Leveraging digital forensics to fight cyber crime and for investigations Understanding digital forensics and its role in investigations What digital forensics can and cannot do Ensuring the legality of digital forensics processes and digital evidence Identifying a competent digital forensics practitioner 1.25 pm 1.40 pm Michael Sonnekus, Cyber Forensic Investigator 1.40 pm 1.55 pm Jason Jordaan, Principal Forensic Scientist DFIRLABS 4

1.55 pm 2.15 pm Clayton Thomopoulos, Director Derek Schraader, Director Deloitte Risk Advisory 2.15 pm 2.45 pm Ask questions, get answers 2.45 pm 3.10 pm CYBER CRISIS MANAGEMENT How should you respond to a cyber incident? Cutting edge communications plan Crisis response and containment procedures Managing reputational risks, shareholder and brand value Corporate responsibility - ensuring the trust of customers, shareholders and the public are still intact Kevin Welman, Managing Director FleishmanHillard 3.10 pm 3.25 pm Refresh & revive over tea break 3.25 pm 3.50 pm LEGISLATION, LIABILITIES & LITIGATION Is your company prepared for the potential litigation and enforcement fallout? Cyber security policies and laws in SA Data privacy (POPI), security and cyber crime Strategies for cybercrime litigation Case examples Andre Vos, Director Rohan Isaacs, Director Norton Rose Fulbright South Africa 5

STRATEGIC CONVERSATION 3.50 pm 4.35 pm The way forward - next steps for cyber defense and fighting cyber crime Navigating to protect corporate balance sheet Effective approach by SMEs Collaboration to improve fraud mitigation and deterrence Managing cyber breach risks and prioritising Aligning roles of C-level executives, risk and IT manager Importance of educating end user Cybersecurity analytics to combat cyber crime? Achieving cyber readiness and preparing for the growing risk of cyber attacks with Panelists Stephen Nel, Head - Security Consulting Dimension Data MEA Dr Barend Taute Chairperson, ECAC (E-Commerce Advisory Committee) Manager: ICT Contract R&D, CSIR Meraka Institute Carol Thomas, Chief Information Officer South African Civil Aviation Authority Vodacom Thokozani Miya, Head, Principal Specialist Security 4.35 pm 4.40 pm Closing remarks from MC & moderator Chris Gibbons, Journalist, Editor, Broadcaster & Trainer 6