World Forum of Central Securities Depositories (WFC)

Slides:



Advertisements
Similar presentations
Governance, Risk Management and Compliance: Summary of Basic Concepts & Program Goals Bob Kotic Chief Financial Officer University of Sydney.
Advertisements

Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Managed Funds Association’s Sound Practices for Hedge Fund Managers 2009 Edition.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
Security Controls – What Works
Corporate Responsibility Index 14 April Athens A tool for improving management of and performance in corporate responsibility.
Workshop on Developing Corporate Bond Market Mr. Masato Miyachi Office of Regional Economic Integration Asian Development Bank Session 1: Overview of Corporate.
OECD Guidelines on Insurer Governance
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
The Office of Infrastructure Protection
September 14, David A. Reed Attorney at Law Reed & Jolly, PLLC (703)
Recent Regulatory Developments in EU and the Roles and Responsibilities of Compliance Officers‘ Presentation at the Banks Association of Turkey TBB - TÜRKİYE.
NEACS: CRO Perspective William Feher Vice President, Internal Audit and Chief Risk Officer October 27, 2015.
Financial Sector Development: Building Market Foundations Through International Codes And Standards Sherman G. Boone, Assistant Director Office of International.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
1 Corporate Governance in Asia From principles to practice: Regional approach Melbourne, Australia 23 October 2009 Kenji Hoki Outreach Advisor Corporate.
1 Chapter 9 Implementing Six Sigma. Top 8 Reasons for Six Sigma Project Failure 8. The training was not practical. 7. The project was too small for DMAIC.
SUSTAINABLE INSURANCE:
Bridging Business & Buildings:
NY DFS Cyber Regulation and the Impact on PA Mutual Insurers
What, when and how – are you prepared?
Today’s managers & leaders are challenged unlike any of the past generations in their roles.
Information Security Policy
Visit Mendocino County: Strategic Direction 2017/ /20
BruinTech Vendor Meet & Greet December 3, 2015
Principles for Recovery and Resolution of a Financial Market Infrastructure ACSDA Senior Leadership Summit – November 16 & 17, 2015.
Physical Security Governance Model
Information Security – Current Challenges
Chris Lintern Co-operative Financial Services
IAIS 23rd Annual Conference Major Projects Update Panel Presentation on Financial Stability and Technical Committee, Michael McRaith, Chair, FSTC Asunción,
Cybersecurity - What’s Next? June 2017
Cyber Risk Presentation to the Board of Directors
THE NEED FOR SWIFT SANCTION SCREENING SERVICE ADOPTION IN NIGERIA
The Role of Departments in the Implementation of the Government Agenda Concepts and Realities FMI Professional Development Day - June 7, 2016.
ISC2 Cleveland Chapter Meeting
Recent initiatives on investor education in Italy
Cyber Security Central Depository Services (India) Limited
Cybersecurity EXERCISE (CE) ATD Scenario intro
Presented by Robert Ford
I have many checklists: how do I get started with cyber security?
B-Hive Europe Open Innovation Platform Fabian Vandenreydt
The Strategic Information Technology Formulation
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Media Pack RegTech Online is a global online news/ events and jobs hub dedicated to the fast paced and rapidly expanding regulation.
IAEA General Conference Regulatory Cooperation Forum Regulatory Approach Prescriptive vs Performance Based David Senior Executive Director -
PGE Chris Nolke, Director of Cybersecurity
Day One Activities Day Two Activities Strengths and Challenges –
Cybercrime: protecting your firm
Cyber Security Culture
MIS 5202 Welcome to IT Governance
a. Financing b. Designing c. Construction d. Operating
Elements of Corporate Resilience
Cyber Security in a Risk Management Framework
TOTAL REWARDS REVIEW FOCUS GROUPS Draft facilitation slides Tool 12
Data Governance & Management Skills and Experience
ACSDA Work Plan For Discussion March, 2018.
KEY INITIATIVE Shared Services Function Management
Association of African Central Banks (AACB) Cairo, Egypt
Session 8: Innovative Uses of Captives: Cyber and Beyond
KEY INITIATIVE Financial Data and Analytics
Payment Systems Oversight approach 16th October, 2017
KEY INITIATIVE Internal Control and Technical Accounting
CYBER RISKS IN SECURITIES SERVICES
Wide Ideas Idea Management Software Idea Management Process
CyberSecurity Strategy For Defendable ROI
Presentation transcript:

World Forum of Central Securities Depositories (WFC) Cyber Security Panel 16 November 2017

Cyber Security Panel: Participants Frank Fischer, Chief Security Officer, Deutsche Boerse Group Joydeep DUTTA , Executive Director and Group CTO, CDSL India Henry Chang, Senior Manager, Fintech Facilitation Office, HKMA Javier PÉREZ-TASSO, Chief Executive, Americas and UK Region, SWIFT Roi SHAPOSHNIK , Founder and CEO, GoldnLinks Dominic WHITE , Chief Technology Officer, Sensepost Joydeep– overview of India specific cyber risks on CSDs Javier – regulatory focus and expectations on cyber resilience Henry - Cyber Sec Fortification Intiatives 2016 Senior Manager – Autor of Initiative and the Tool – outline of Cyberlandscape and program Dominic – life hack

Introduction & Backgrounder In line with the Guidance on Cyber Resilience for Financial Market Infrastructures issued by CPMI IOSCO in June 2016. This comprehensive document is viewed as a key support for PFMIs (issued in 2014) and provides meaningful guidance on issues such as: Situational awareness to understand and pre-empt cyber-events; Collaboration to drive resilience in support of broader financial stability objectives; Cyber-governance to implement and review the approach to managing protection against cyber-risks to ensure effective security controls that protect confidentiality; The integrity and availability of assets and services as well as the testing of the elements of the cyber-resilience frameworks to ensure their overall effectiveness. This panel will present ideas and experiences on how this major threat is currently being combated and how this battle will be fought in the future. We will conclude the session with a life hacking demonstration. The Audience will be asked to answer a series of questions during the session. Please use the devices on your table

Key topics of discussion Joydeep DUTTA (CDSL India) Cyber Security is the responsibility of the board, there has to be a decent board perspective Cyber defense ownership is with every employee, regulatory influence (consulted by big four) Henry CHANG (HKMA) Cyber Sec Fortification Initiatives 2016. Author of Initiative and the Tool – outline of Cyber landscape and program Collaboration among organizations (banks, depositories, FMIs) – HK Cyber intelligence sharing platform for the banking industry  situational awareness, align IOSCO No guarantees – tools not enough (rules are more important than tools) – no 100% guarantee Javier PÉREZ-TASSO (SWIFT) Mindset / culture change in organizations to cover cybersecurity properly, tone from the top, “when you will be attacked”  resilience in IS program Minimum mandated requirements, reg. suggestions are sounded w/Industries (engagement model w/regulator). Board / Regulatory reporting requirements (rules), leverages of the CPMI-IOSCO cyber resilience framework Roi SHAPOSHNIK (Goldnlinks) The Black Swan The Perception Cyber insurance and the influence of the business Dominic WHITE (Sensepost) how attackers think, use to prioritize a security program

Voting questions for the Audience 1. How do you organize Cyber Security? Board level responsibility Cyber / CISO report to Board Other (e.g. IT topic) 2. Do you have a board approved cyber resilience strategy? Yes No, but within six months No