ORIGINAL SWISS ETHICAL HACKING Your texte here …. 2015 © High-Tech Bridge SA, Geneva, Switzerland – www.htbridge.com Combating cybercrime: efficiency or.

Slides:



Advertisements
Similar presentations
4.10 Zachary.
Advertisements

The evolution of European security research and innovation programmes: changing purposes and rationales Jean-Marc Suchier ETTIS R&I strategies and policy.
Remittances and Financial Inclusion Workshop July , Sydney Carlo Corazza Payment Systems Development Group Financial Infrastructure Service Line.
What are the opportunities and potentials for HK businesses in the mainland?
A Cyber Security Company June 16, 2009 Cyber Security: Current Events and White House Cyberspace Policy Review.
Risk & Return. FIN 591: Financial Fundamentals/Valuation2 Systematic and Unsystematic Risk Total risk decreases as the number of securities in the portfolio.
IT Outsourcing Tyler Baze Kent Bushnell Anne Travous.
(Geneva, Switzerland, September 2014)
An Overview of Financial and Multinational Financial Management Corporate Finance Dr. A. DeMaskey.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
Defining Security Culture Peteris Treijs, project manager, State Information Network Agency, Latvia.
Small Business Management
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Why innovation is not happening in small scale medical equipments Industry? Subject: Innovation Management Date: 28 Feb 2010 Submitted to:Shekhar Badve.
Towards a Revised Regulatory Regime : A UK Perspective Richard THORPE Manager, Accounting Auditing Transparency & Valuation, UK Financial Services Authority.
Ideas about ICT Management Faculty meeting to discuss the Comp/Tele program Henri Slettenhaar Webster University Geneva.
Banking Security in a Digital Age Trevor LaFleche, IDC Financial Insights.
BUILDING THE INVESTMENT PROFESSION Paul Smith, CFA President and
1 Employment in the European Union: Perspectives and threats Labour markets, Ageing labour force, migration International Conference “Days of Socio-Economy:
Cyber Security Nevada Businesses Overview June, 2014.
Chapter 11 Interorganizational and International Information Systems.
Jordan’s ICT Sector Information Technology Association
Nebojsa Vukovic Listing, Development and Public Relations Department Banja Luka Stock Exchange Tbilisi, Corporate governance.
Devising A Strategy for Growth Mission, Vision, Values Brian O’Connell
© Infosys Technologies Limited Independent Validation Services V. R. Renganathan Member – Engagement Management, IVS Unit.
States, Markets, and the Good Society State (central planning by government) Market (free market) What balance between states and markets most enhances.
1 The Challenges of Globalization of Criminal Investigations Countries need to: Enact sufficient laws to criminalize computer abuses; Commit adequate personnel.
Management Information Systems, 3 rd Edition Effy Oz 1 Chapter 11 EDI, Supply Chain Management, and Global Information Systems.
1 EDI, Supply Chain Management, and Global Information Systems Chapter 11.
We train for the future! We are: YMCA (Young Minds Create Alternatives ) We come from : Romania.
Internal Investigations: What you need to know Tim Bobak.
CIBC Global Services © 2006, Echoworx Corporation Ubiquity of Security Compliance and Content Management Stephen Dodd Director – Enterprise Accounts.
NEACS: CRO Perspective William Feher Vice President, Internal Audit and Chief Risk Officer October 27, 2015.
POLITICS, DEFICITS, AND DEBT Deficit and Debt. The Definition of Debt and Assets Debt is accumulated deficits minus accumulated surpluses. Deficits and.
Chapter 1 Investments - Background and Issues McGraw-Hill/Irwin © 2004 The McGraw-Hill Companies, Inc., All Rights Reserved. Investments & Financial.
Finance & Finance Law. What is finance? Finance describes the act of providing money, capital or other financial resources to assist in facilitating a.
Turkish economy Brief economic history Economic policies
BP-CENTRO Finland Team 1 Jiri Sorvari Gonzaga Rugambwa Objectives and Policies.
Cyber Security Architecture of Georgia Giorgi Tielidze 0 Current Challenges and Future Perspectives Tbilisi 2015.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
Health Technology Assessment
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Table 1: Comparison of Management and Financial Accounting.
The Scope Of Corporate Finance Professor XXXXX Course Name / Number.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Chapter 6. Lessons 1. Becoming an Entrepreneur 2. Small Business Basics 3. Starting a Small Business EQ: What role does small business play in the U.S.
COUNTRY RISK ASSESSMENT China & Japan Eliza Bogucka Magdalena Mirek Dominika Dunin - Szpotańska.
Work, Exchange, and Technology Alison A, Ashley A, Chris B, Devin F, Melody H, Matt S.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
TruSTAR Sensitive & Proprietary Cloud CISC: Cyber incident exchange and collaboration February, 2016 “We cannot solve problems with the same thinking we.
LINKAGES BETWEEN INSTITUTIONS OF HE, VET AND LABOUR MARKET MR NIKOS IOANNOU.
An Overview of Financial and Multinational Financial Management.
Cybersecurity as a Business Differentiator
Cyber attacks are increasing in number and severity every day…
Governance, Risk Management & Compliance (GRC) Market Share, Segmentation, Report 2024
CYBER CRIME Matthew Purchase.
REGIONAL INSURANCE MARKET INTEGRATION
Chapter 5: Will Your Future Be in Cybersecurity?
Community of Users.
NATIONAL AND INTERNATIONAL MEASURES OF CYBERSECURITY
Entrepreneurship and Small Business Management
KEY TERMS entrepreneur entrepreneurship venture capital innovation
Risk Articulation Articulation Translation to Risk Register
Conference On Improving Domestic Resource Mobilization (DRM) and Stemming Illicit Financial Flows (IFFs) 12th-15th March 2019, Nairobi Kenya Presented.
KEY INITIATIVE Finance Function Management
Cyber Week Grill the Experts!
Discussion Government Private Business Tools for prevention Congress
Towards a frictionless social security
Global Cyber Security Market (By Product Segments, Service Segments, Industry Verticals, Geography, Recent Developments) - Forecast to 2025
Presentation transcript:

ORIGINAL SWISS ETHICAL HACKING Your texte here … © High-Tech Bridge SA, Geneva, Switzerland – Combating cybercrime: efficiency or effectiveness? World Summit on the Information Society Forum th of May 2015

ORIGINAL SWISS ETHICAL HACKING Your texte here … © High-Tech Bridge SA, Geneva, Switzerland – Some quick facts and numbers (2014)  Worldwide information security spending will reach $71.1 billion, almost 8% growth as organizations become more threat-aware – Gartner  Cost of the global cybercrime is about $445 billion per year, a 33% percent growth - Center for Strategic and International Studies (CSIS) and McAfee  Companies experience in average 2 successful attacks per week – Ponemon Institute and Hewlett-Packard  Cybercrime is rising significantly in Europe, which reported a 41% jump in the number of incidents detected over the last year – PriceWaterhouseCoopers

ORIGINAL SWISS ETHICAL HACKING Your texte here … © High-Tech Bridge SA, Geneva, Switzerland – The Origins of the Cybercrime  Management: unawareness, ignorance, wrong priorities, negligence.  IT Teams: lack of time and budget, lack of competence, negligence.  Globalization and inequality: many talented young people cannot get a well-paid job to apply their skills in their countries, at the same time they cannot move to developed countries due to immigration restrictions.  Weak or inefficient legal system: information exchange between some countries is very slow or complicated, while some countries does not consider many sorts of cybercrime a crime. Law enforcement agencies don’t‘ have enough experience and skills to investigate cybercrime.  Inefficient or ineffective information security products and solutions: cybersecurity market is rising, however very few cybersecurity company manage to create both efficient and effective solutions capable to resolve real problems and mitigate appropriate risks.

ORIGINAL SWISS ETHICAL HACKING Your texte here … © High-Tech Bridge SA, Geneva, Switzerland – Two main problems the infosec industry has  Lack of efficiency: security product, solution, SaaS or service that has poor quality and doesn’t solve the problem it pretends to. Quite easy to detect and thus to avoid.  Lack of effectiveness: security product, solution, SaaS or service that are efficient in comparison to other products, but solve the problem that [almost] nobody actually need to solve.

ORIGINAL SWISS ETHICAL HACKING Your texte here … © High-Tech Bridge SA, Geneva, Switzerland – Proposed Solutions  Management shall be involved directly, and directly responsible for corporate cyber security.  Governments shall integrate national cybersecurity into their financial, educational, and political programs.  Cybersecurity company shall focus on real priorities and needs of their customers, not about making money on stock market hype. Thank you for your attention! Questions: