Brussels June-11-2015 Cyber-Security Cyber-Protection Cyber-Sustainability.

Slides:



Advertisements
Similar presentations
Mobility in Government Consolidation & Wrap-up Lee Naik3 Oct 2013.
Advertisements

New Technology Environment Technology as a Strategic Asset Tom Lehman Lehman Associates, LLC Lehman Reports Association TRENDS Live September, 2014.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco Confidential 14854_10_2008_c1 1 Holistic Approach to Information Security Greg Carter, Cisco Security.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Security Controls – What Works
© 2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Global Citizenship at HP Debra Dunn.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
(Geneva, Switzerland, September 2014)
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Trends in Corporate Social Responsibility Reporting
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Insight Consulting Exercising the Top Team Simon Langdon, Principal Consultant.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
INFORMATION SECURITY GOVERNANCE (ISG) Relates to the security of information systems Is an element of corporate governance.
Information Security Governance 25 th June 2007 Gordon Micallef Vice President – ISACA MALTA CHAPTER.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Steve Bennett President & Chief Executive Officer NASDAQ OMX International Investor Program December 4, 2013.
Social Media Jeevan Kaur, Michael Mai, Jing Jiang.
Continual Service Improvement Process
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
CSI - Introduction General Understanding. What is ITSM and what is its Value? ITSM is a set of specialized organizational capabilities for providing value.
Presentation of projects’ ideas. 1. Madrid Network “A public-private network which aim is to contibute actively to position Madrid Region in the top.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Project co-funded by the European Commission within the 7th Framework Program (Grant Agreement No ) Business Convergence WS#2 Smart Grid Technologies.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
FP7 Concertation Meeting ICT for Transport Brussels 4 – 5 April 2011 Paolo Paganelli Insiel FP7 Call 4, CSA Logistics for LIFE.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Enterprise Cybersecurity Strategy
AUSTRALIA. A National Strategy for Enhancing the Safety and Security of our Food Supply ที่มา : We pride ourselves on our high safety and security standards.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Swedish Risk Management System Internal management and control Aiming to Transport Administration with reasonable certainty to.
Cyber Risk Management Solutions Fall 2015 Thomas Compliance Associates, Inc
LSEC H2020-DS - & CIP Ulrich Seldeslachts, Brussels, January 27th, 2016.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
May21972 Organizational A Change in Action BADM Presented By: Bin, Nancy, Shaarah, and Rebekah.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
EIC – Jornada ciberatacs cyber risk outlook June 2016.
Security and resilience for Smart Hospitals Key findings
Cybersecurity as a Business Differentiator
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
Information Security Program
Information Security – Current Challenges
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Cyber Security: State of the Nation
Compliance with hardening standards
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
COMPUTER AIDED LOGISTICS & SECURITY
Cyber Security Challenges & Opportunities.
I have many checklists: how do I get started with cyber security?
Challenges and Opportunities
Trust and Security Unit
How to Mitigate the Consequences What are the Countermeasures?
Cyber Security Culture
Securing Critical Chemical Assets: The Responsible Care® Security Code
Cyber Security in a Risk Management Framework
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
IT Management Services Infrastructure Services
Presentation transcript:

Brussels June Cyber-Security Cyber-Protection Cyber-Sustainability

Concerns about Transport Transport systems are every day more ICT dependents Internet (TCP/IP), the Cloud and social networks are the environment Internet, social media and people not enough aware are the main vulnerabilities Brussels June

Concerns about Transport (Cont.) Main risks: Public transport as a target for terrorism (Sep 11 th ) Signalling, vehicles everyday more controlled through Internet, ransom ware Transport System as component of Supply Chain as a target for cyber crime mafias for economic purposes Modify cargo manifest, EDI contamination, DoS, etc. Brussels June

Preliminary 360º on Transport Aware the Organizations and stake holders on cyber security and unsafe habits Analyse vulnerabilities Perform a risk assessment and fix the risk acceptancy On strategic IT, the Information is strategic Invest in technology and calculate the ROI (ROSI) Not only should we protect our assets, we could be a vehicle to infect customers and suppliers Benchmarks Brussels June

5 Antimalware Cifrado Formación Classification Best Practices Awareness Antimalware Cipher Data Masking Benchmark Training GRC Audit management Consulting ISF Brussels June

Landscape in Cybersecurity The Good ones Governments Organizations People The Bad ones Governments Organizations People Brussels June

The leading, global authority on information security and information risk management Facts Growth on cybercrime: Activity Profit Damage Crime as a Service Malware morphs: Mutation Engine (ME) Stuxnet begot Duqu, then begot Gauss Malware when detected is several years old The average of malware activity inside a system was 227 days in 2013 and 230 days in 2012 (Mandiant Report) Brussels June

The leading, global authority on information security and information risk management Our point of view ProcessesSystemsTechnology Today: From technology to the business process Brussels June

The leading, global authority on information security and information risk management ProcessesSystemsTechnology Change the paradigm From top management to the technology Brussels June

The leading, global authority on information security and information risk management Risks and Responsibilities There are lots of Risks to mitigate: Cyber-attacks Non compliancy with laws and regulations Reputational lost All of them will affect people, assets and the business itself. Brussels June

The leading, global authority on information security and information risk management Benchmark Organizations need to benchmark their status on security regarding risks, threats, and responsibilities. CARONTE could be the reference for this benchmark in an agnostic-industry basis. Cyberdelincuency is evolving continuously. To work with static risks maps makes controls and procedures quickly obsolescent User awareness is essential. Brussels June

The leading, global authority on information security and information risk management Create an Immune system Because the gaps and the isolation are not possible in a Global World, lets copy the Immune System, that works from several million years. Let balance the cyber protection from hygiene to asepsia Live with the risk identifying your risk acceptancy Brussels June

CALS Message Put people, methodology and technology working with a synergic mentality. Holistic vision vs Reductionist vision Brussels June

Computer Aided Logistics (CALS) 14 CALS is a Company specialized in GRC (Governance, Risk & Compliance) tools and Information Security implementations. Also with national and international agreements we offer solutions in the following environments:  Information and Communication Systems: Analysis and Risk Management for the organizations, Audits and Security solutions including international standards, methodologies and good practices.  Consulting and Training: Standard and tailored training. Awareness projects as a first step for information security. The company is established in May 1997, with the basic idea of offering the market an alternative for strategic services and solutions with a high return of investment (ROI) Brussels June

We share with the industry their concerns regarding “cyber insecurity” We hold the technological tools to build a governance on cybersecurity platform The above conditions allows us to understand the cyber security and cyber protection as a global an integrated practice affecting every one in Organizations CALS expertise Brussels June

The ISF could also be behind this European Project CALS is also the ISF agent for Spain, Portugal and Latin America Brussels June

What is the ISF? An international association of near 400 leading global organizations (Fortune 500/Forbes 2000), which... Addresses key issues in information risk management through research and collaboration Develops practical tools and guidance for its members Is fully independent, not-for-profit organization and driven by its Members Promotes networking within its membership The leading, global authority on information security and in The leading, global authority on information security Brussels June

Some Research & Reports You Could be Next: Learning from incidents to improve resilience The 2014 Standard of Good Practice for Information Security Data Analytics for Information Security Threat Horizon 2014 – Cyber Security Strategies: Achieving cyber resilience Federated Identity Access Management Cyber Citizenship Hacktivism Information Security Governance – Raising the game Securing Consumer Devices Securing Cloud Computing Beyond the clear desk policy Securing the information lifecycle Information security for external suppliers Information security maturity models Protecting information in the end user environment Information security assurance Security audit of business applications Information security governance (Briefing) Reporting information risk Network convergence Information security assurance Benchmark reports: o Critical Business Applications o The impact of information security investment o Consolidated benchmark results o Cross reference to ISO/IEC 27002, COBIT version 4.1 Brussels June

19 Contact Computer Aided Logistics Velázquez 86- B – Madrid Tel: Móvil: Fax: Rafael Rodríguez de Cora