Partnership: Making Common Cause in a Common Effort

Slides:



Advertisements
Similar presentations
AFCEA DC Cyber Security Symposium Military Joint Cyber Command Panel Harry Raduege Lieutenant General, USAF (Ret) Chairman, Center for Network Innovation.
Advertisements

Copyright © 2011 Cloud Security Alliance Trusted Cloud Initiative Work Group Session.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
IDESG Goals & Work-plans for 2013 and beyond Brett McDowell IDESG Management Council Chair
The U.S. Coast Guard’s Role in Cybersecurity
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
10/29/20091 Innovation Partnerhsip Models with the Finance Sector Dept. of Homeland Security Science & Technology Directorate Douglas Maughan, Ph.D. Branch.
Information Resources and Communications University of California, Office of the President UCTrust David Walker Office of the President University of California.
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Closing the CIP Technology Gap in the Banking and Finance Sector Treasury Department Office of Critical Infrastructure Protection and Compliance Policy.
PPA 573 – Emergency Management and Homeland Security Lecture 9b - Department of Homeland Security Strategic Plan.
Cloud Usability Framework
Security Issues on Campus: Government Initiatives Rodney J. Petersen University of Maryland Educause/Internet2 Security Task Force Copyright Rodney J.
Federating Identity Management in the Government of Canada Identity North Conference November 20 th 2012 Presented by: Rita Whittle Senior Director, Cyber.
Part of a Broader Strategy
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Military Sentinel Presentation November 19, 2008 John Krebs, Attorney Consumer Sentinel Network Program Manager Federal Trade Commission.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
1 © 2003 Cisco Systems, Inc. All rights reserved. CIAG-HLS Security For Infrastructure Protection: Public-Private Partnerships KEN WATSON 15 OCT.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Ministry of Transport, Information Technology and Communications
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
© BITS BITS and FSSCC R&D Efforts John Carlson Senior Vice President of BITS Panel on Data Breaches in Payments Systems-- Roles and Best Practices.
Secure Connections for a Smarter World Dr. Shuyuan Mary Ho Assistant Professor School of Information Florida State University.
Controlling Fraud Risk Exposure and Loss Sherri Goodman Director of Fraud Operations September 22, 2005.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
E-Authentication: Enabling E-Government Presented to PESC May 2, 2005 The E  Authentication Initiative.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
Your London card and what this means for authorities Steve Pennant London Connects Chief Executive 29 Jan 2007.
Chisinau 2004NATO ANW1 Security Issues for e-Society Oliver B. Popov MSU, SU, SCMU NATO ANW The Third CEENet Workshop on Managerial Issues - MIXREN Chisinau,
S/L/T Version 1 National Response Framework Overview for Local, Tribal and State Audiences January 22, 2008.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Ensuring Academic Integrity with Online Proctoring Lauren Botts-Posey Partnership Representative.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
NSTIC and the Identity Ecosystem Jim Sheire Senior Advisor NSTIC National Program Office, NIST 14 November 2012.
By Celine and Josh.  A loss caused by customer theft, fraudulent payment, or nonpayment  Shoplifting costs retailers billion dollars a year, according.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
1 How Serious Are Financial Institutions About Electronic Identity? -- for -- Educause Policy 2005 Conference Jim Gross Wells Fargo April 7, 2005.
Framing Identity Management Recommendations Transport & Security Standards Workgroup November 19, 2014.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
A Unique Challenge INTERNATIONAL ORGANIZED CRIME.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
Realize the Power of Information IJIS Institute Briefing June 24, 2014.
6/24/2016Financial Services Sector Coordinating Council For Critical Infrastructure Protection R&D Committee 1 Financial Cybersecurity in Complex, Heterogeneous.
©2008 Schwab Retirement Technologies, Inc. All rights reserved. ( ) Schwab RT Web Image-Based Authentication Enrollment Enhancements Mitchell Savage.
Trust in Trust Frameworks, the missing link  Abbie Barbir, Ph.D  OASIS Board of Directors,
CMGT 411 Week 3 DQ 3 What are the components of the Federated identity management and are they addressed in White House (2011) Reference White House (2011).
Figure 1. Critical Infrastructure Organizations Believe that the Cyber-threat Landscape Is Getting Worse From: ESG Brief: Critical Infrastructure Organizations.
Enterprise-level Identity Protection
Higher Education’s Role in the Identity Ecosystem
cybercrime Presented to you by : NAMES MATRIC NO
Jack J. Bensimon Countering Identity Theft and Synthetic Identities:
An evolving effort to meet taxpayer needs
National Cyber Security Programme Local : Building Resilience Together
8 Building Blocks of National Cyber Strategies
The Financial Services Technology Consortium
Cyber Security and Consumer Financial Transactions Data Security
Prepared By : Binay Tiwari
John Carlson Senior Director, BITS
Presentation to the INTOSAI Working Group on IT Audit Systems assurance and data analytics for continued audit quality and improved efficiency of audits.
The best approaches to facilitate the processing of business transactions and interactions with systems that pre-date the Web, and address the need to.
A simple and secure single sign-in authentication service, designed to help businesses prove who they are when transacting with public services online.
University of Maryland Robert H. Smith School of Business
Tim Masela Cairo – April 2019
National Strategy for Trusted Identities in Cyberspace
Cybersecurity and its Relevance to CIT
Presentation transcript:

Partnership: Making Common Cause in a Common Effort Greg Garcia Partnership Executive Enterprise Information Management Bank of America

Meeting customer needs Safe, secure

Meeting customer needs Safe, secure Simple, seamless, convenient access

Meeting customer needs Safe, secure Simple, seamless, convenient access Active customers

The threat: Cyber crime

Cyber crime losses are growing

Identity crime affects all sectors

Identity crime affects all sectors

Identity crime affects all sectors

Creating trusted identities Interoperable federated frameworks

Creating trusted identities Interoperable federated frameworks Multiple methods

Creating trusted identities Interoperable federated frameworks Multiple methods End-to-end identification

Creating trusted identities Interoperable federated frameworks Multiple methods End-to-end identification Higher-level authentication

Required: Open standards NOT proprietary NOT imposed But in partnership

We believe in partnership OASIS National Strategy for Trusted Identities in Cyberspace (NSTIC) Financial Services Sector Coordinating Council (FSSCC) Identity Theft Assistance Center (ITAC) BITS/Financial Services Technology Consortium (FSTC)

Questions to ask ourselves ?

Thank you! Partnership: Making Common Cause in a Common Effort Greg Garcia Partnership Executive Enterprise Information Management Bank of America