Working Jointly to Tackle e-Crime Paul Wright Hi-Tech Crime Team City of London Police.

Slides:



Advertisements
Similar presentations
Philippine Cybercrime Efforts
Advertisements

Improving outcomes for young people Jamie Callaghan & Fiona Muir Community Justice.
Strategic Centre for Organised Crime Partnerships and engagement with communities.
What’s not changing? Overall Vision – ‘fighting crime, protecting people’ Need to continue to improve performance Growing public expectations.
A partnership approach to tackling Cybercrime Prof Bernard Silverman Home Office Chief Scientific Adviser.
SA Rhino Poaching Incidents
TOTAL POLICING Business Crime Strategy update London Business Improvement Districts meeting 3 June 2014 Rebecca Lawrence, Director of Strategy Mayor's.
Who pays? Prioritising Prevention Through Collaboration in Austere Times Alan Dobie, Executive Director, SBCC.
SECURITY STRATEGIES OF THE REGION Witek Nowosielski.
Christopher Cooney International Liaison Officer Scottish Crime & Drug Enforcement Agency December 2012.
Serving with pride and confidence Knowledge for Change Chief Constable Sara Thornton CBE QPM Cambridge Evidence Based Policing Conference 4-6 July 2011.
Cyber Crime in the Digital Age
Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Mumbai Cyber Lab A Joint Endeavor of Mumbai Police and NASSCOM Dr. Pradnya Saravade Dy.
Security Threat Groups Identification and Management
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
Higher Education Cybersecurity Strategy, Programs, and Initiatives Rodney Petersen Policy Analyst & Security Task Force Coordinator EDUCAUSE.
Online Gambling A Law Enforcement Perspective Brigadier Piet Pieterse South African Police Service Directorate for Priority Crime Investigation (DPCI)
 Can I do this?  How should I be looking at my department?  How are our “security” relationships?  What things could I be doing to sell our.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Website Hardening HUIT IT Security | Sep
Consultancy.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Legislation and Working Practices. AIM: To understand the importance of policy and legislation To identify & summarise Key legislation To examine policies.
Metropolitan Police Area Human Trafficking Team Terms of Reference Prioritise those cases linked to Organised Criminal Networks. 24 hour advice to BOCU’s.
Overview of SAPS roles and responsibilities and demand reduction Assistant Commissioner Tertius Geldenhuys.
Japan National Oil Company Training Centre Anthony Hegarty - aiming higher Global Threats – Global Solutions.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Network and Systems Security Security Awareness, Risk Management, Policies and Network Architecture.
Cyber Security Nevada Businesses Overview June, 2014.
JARAP Cybercrime D/Inspector Phil Tebbs – Cybercrime Implementation Lead.
Female Genital Mutilation
COMMUNITY POLICING IN UGANDA A PAPER PRESENTED AT THE 6 TH ANNUAL JLOS FORUM HELD AT SPEKE RESORT MUNYONYO, 20 TH MAR BY DIGP[ OKOTH OCHOLA, DEPUTY.
Planning government communications Michael Warren Head of Campaigns & Strategy Prime Minister’s Office and Cabinet Office Communications.
Cross-Border Cooperation November 17, Purpose Highlight how Canada and US advance cross-border cooperation  Canada-US law enforcement context.
Project Guardian NCSN Graham Daly Head of Crime Prevention and Community Safety Transport for London Ricky Twyford Inspector – Project Guardian Manager.
Avon & Somerset Constabulary The Operating Model Chief Superintendent Jon Reilly.
New Rules for the Digital Age NSW Ombudsman Symposium 26 May 2009.
PwC Informations- gold assets. 2 Introduction 3 Central and Eastern EuropeGlobal Number of companies that have been victims of economic crime in the.
E NGINEERING STUDIES IN T ELECOMMUNICATIONS S ECURITY School of Communication Engineering.
Canada Border Services Agency Transportation Border Working Group (TBWG) April , 2010 Boston, Mass. CBSA OTTAWA UPDATE.
Defense Security Service Joint Industrial Security Awareness Council March 20, 2015.
Kent & Essex Serious Crime Directorate Cyber Crime – Current/Future Capabilities.
Bath and North East Somerset – The place to live, work and visit Prevention in Adult Safeguarding Helen Wakeling Safeguarding Lead: Adults and Quality.
National and International Development Strategy International Development Unit / Gordon Thomson / January 2016.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Hamid Jahankhani Chapter 21 - Developing a Model to Reduce and/or Prevent Cybercrime Victimization among the.
Children with a Parent in Prison Conference: Impact, Issues, Practice and Policy Plymouth University 2 nd April 2012 Workshop 1 Developing policy and practice.
Melton Area Safer Communities Partnership ‘ Working together to tackle crime and the fear of crime in the Borough of Melton’ Kevin Quinn, Community Safety.
Incident Response Christian Seifert IMT st October 2007.
NEW ZEALAND’S CYBER SECURITY STRATEGY Presentation by: MED, DIA & GCSB.
SWGfL e safety NEN Safeguarding Group David Wright, South West Grid for Learning NEN Safeguarding Group.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 – Common Foreign and Security Policy.
Scottish Policing 2011 – Risks To Communities & Information-Sharing Russell Scott Visiting Academic Edinburgh Napier University Serious Organised Crime.
ILP model- Montenegro OSCE Annual Police Experts Meeting
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
GDPR Awareness and Training Workshop
Top 6 Strategies of Digital Marketing.
The Need For Forensic Capabilities In The Commercial Sector
Attacks on The Manufacturing Industry
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
Cyber Risk & Cyber Insurance - Overview
UW System Information Security
Enhanced alerting and collaborative incident management
IS Risk Management Report (Template)
EREA Emergency Planning for 2018 and beyond
Role of State Audit Bureau of Kuwait in promoting and audit of IT Security  
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Working Jointly to Tackle e-Crime Paul Wright Hi-Tech Crime Team City of London Police

Introduction Aim Define the Problem Security Principles Where to look for a Solution Dual Track Approach What can we collectively Do? Future Strategies

Aim Increase reporting of Hi-tech and e-Crime Growth of a secure Digital Environment Interact in the pursuit of Common Objectives Exchange of Digital Intelligence

Loss of Data Growth in Criminal Data Markets Report IT abuse and Data Leakage Advances in Technology Policies Procedures and Guidelines

Hi-Tech, Cyber and E-Crime Boundaries Corpus Juris Data Leakage and Compromise Data Markets Foundation Stones Partnerships

‘Catch Me If You Can”

Security Principles Primary Objectives Confidentiality-Integrity-Availability Risk and Exposure Assessment e-Crime Prevention Computer Forensics Digital Intelligence

Alfonso Capone “The Secret Six has licked the rackets,. They’ve licked me. They’ve made it so there’s no money in the game.”

Adopting a Dual-Track Approach Begin with consultation Risk and Exposure assessment process Jointly decide Intelligence or Investigation Understand the issues

What Can We Do? Scope the Problem Raise awareness of the Problem Define what constitutes e-crime Make hi-tech and e-crime Visible Increase the resources Available Address internal Issues

Future Strategies Recognise the Threat e-Crime Prevention Strategy Security of Data and Systems Pro-Active Approach First Strategic Step

Working Together Paul Wright Hi-Tech Crime Team City of London Police +44 (0)