® ® CLS and the CLS Logo are registered trademarks of CLS UK Intermediate Holdings Ltd © 2014 CLS UK Intermediate Holdings Ltd. www.cls-group.com Growing.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

Driving change in information risk within the financial services industry Subtitle Date.
Mobile Technology & Cyber Threats Promoting E-Commerce in Ghana Ruby Saakor Tetteh Ministry of Trade & Industry, Ghana Sixth Annual African Dialogue Consumer.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Presentation overview
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Draft of June 9, 2015 Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing.
® CLS and the CLS Logo are registered trademarks of CLS UK Intermediate Holdings Ltd © 2014 CLS UK Intermediate Holdings Ltd. Corporate.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
SWAMI Threats, vulnerabilities & safeguards in a World of Ambient Intelligence David Wright Trilateral Research & Consulting 21 March 2006.
90% of EU exports consist of product and services of IPR-intensive industries. Among 269 senior risk managers, 53% said IP loss or theft had inflicted.
“Mitigating Offshoring Risks in a Global Business Environment“
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
© 2014 WESTERN DIGITAL CORP. ALL RIGHTS RESERVED. Company Confidential Legislative & Regulatory Activities Involving Cyber Security Bob Bowen May 2015.
Protecting Corporate Assets and the Brand in a Digitized, Global Environment July 29, 2013 Stacy-Ann Golding.
Information Warfare Playgrounds to Battlegrounds.
Cyber Security Nevada Businesses Overview June, 2014.
1 Jim Devlin Comptroller of the Currency November 5, 2009 Data Breaches in Payments Systems -- Roles and Best Practices for the Public and Private Sector.
Cyber Warfare Situational Awareness & Best Defense Practices Presented by Hasan Yasar
2011 East African Internet Governance Forum (EA – IGF) Rwanda Cyber briefing: Positive steps and challenges Didier Nkurikiyimfura IT Security Division.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Federal Trade Commission U.S. Rules on Privacy and Data Security Organization for International Investment General Counsel Conference October 16, 2009.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Ewan Donald Cyber Security FEEL FREE A NEW APPROACH TO CYBER SECURITY.
1/9 최신정보보호기술 경일대학교 사이버보안학과 김 현성. 읽기 단계 (1) 문장 분석  주어, 동사  구, 절, 관계사, and or  모르는 단어 찾기 (2) 의미 파악  문맥의 흐름에 맞는 단어의 의미 찾기 (3) 문맥 연계  앞뒷 문장과 연계한 문장의.
Information Warfare Playgrounds to Battlegrounds.
New A.M. Best Cyber Questionnaire
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
IT Security in Nepal: Issues and challenges Rajan R. Pant ITSERT-NP.
Breakaway Session 2: Data Protection and The Role of the Data Protection Supervisor Michael Mingle Director, NTSS Solutions (UK) D ATA P ROTECTION C ONFERENCE.
API Task Force Josh Mandel, Co-Chair Meg Marshall, Co-Chair December 4, 2015.
Financial Times Matheson is ranked in the FT’s top 10 European law firms Matheson has also been commended by the FT for corporate law,
Successful places with homes and jobs A NATIONAL AGENCY WORKING LOCALLY Regulation and Development – Impact of the new framework.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Cybersecurity is not a new issue! Dr. Edgar Frank Codd, an IBM researcher, wrote a paper that described the fundamental model of the relational databases.
FFIEC Cybersecurity Assessment Tool Maine Credit Union League September 23, 2015 Patrick Truett, Information Systems Officer National Credit Union Administration.
Retail & Service 1. 2 The Retail & Service industry encompasses a wide variety of businesses. This segment includes: Businesses engaged in selling goods.
JOHN M. HUFF NAIC PRESIDENT DIRECTOR, MISSOURI DEPARTMENT OF INSURANCE JUNE 16, 2016 NAIC CYBERSECURITY INITIATIVES.
Clients and Prospective Clients on the Threat of Cyber Crime
Physical Security Governance Model
Cyber Security – An Existential Threat? (IIC, Singapore)
Information Security – Current Challenges
Financial Institutions – Cyber Risk
Data Minimization Framework
Cybercrime: Mitigation Challenges
BUSINESS CONTINUITY BY HUI ZHENG.
Cyber Security: State of the Nation
E-BANKING RISK MANAGEMENT
ASSET - Automotive Software cyber SEcuriTy
Board Concerns About Cyber Security
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Jack J. Bensimon Countering Identity Theft and Synthetic Identities:
SAM Healthcare Cybersecurity Assessment
SAM Financial Services Cybersecurity Assessment
Creating & Sharing Value with Network Activity & Threat Correlation
The State of Cybersecurity and
PGE Chris Nolke, Director of Cybersecurity
Protecting Your Company’s Most Valuable Asset
Introduction of ISO/IEC Identity Proofing
DATA LOSS PREVENTION Mr. Collins Oduor.
Strategic threat assessment
Session 8: Innovative Uses of Captives: Cyber and Beyond
Modernizing Canada’s Regulatory Frameworks
CYBER RISKS IN SECURITIES SERVICES
CyberPaths Interdisciplinary Modules
Presentation transcript:

® ® CLS and the CLS Logo are registered trademarks of CLS UK Intermediate Holdings Ltd © 2014 CLS UK Intermediate Holdings Ltd. Growing Challenges in Cyber Security AIBA Quarterly Meeting September 9, 2014

2 » Technology » Actors & Motivations » Regulatory Challenges » Industry Challenges Topics

Challenge 1: Technology » Offensive and Defensive security technologies continue to evolve at a blistering pace. » The hot tools of even just 1 or 2 years ago are as dated as your teenager’s favorite band from a year or two ago » Offensive technologies can have a faster deployment cycle than defensive technologies, especially for larger organizations that have a lot of work required for engineering and deployment » Trenches and Machine-guns » Much more investment going in to offensive technology research due to a change in the main threat actors » No private entity has put a man on the moon… » Examples that would have seemed like Hollywood Sci-Fi not so long ago… » Stuxnet » Major Retailers 3

Challenge 2: Actors & Motivations » Financial – Retail bank fraud, Treasury Accounts, ID Theft » Crime syndicates » Complex value chain » Combination of low and high tech techniques » Ideological – Denial of Service, Data Theft, Vandalism » Political: “Anonymous”, Izz ad-Din al-Qassam Cyber Fighters, Wikileaks » Personal: Disgruntled employee » Industrial Espionage – Data Theft » Defense technologies » Manufacturing » Strategies » Nation-State Sponsored – Data Theft, Denial of Service » S. Korean Banking Outages » Stuxnet » NASA? » Fun and Games – Vandalism, Data Theft, Data Manipulation » Lulzsec 4

Challenge 3: Regulatory Challenges » Regulations continue to evolve as the threats evolve » This means that regulated entities need to ensure that their security strategies and delivery roadmaps satisfy defensive needs AND regulatory requirements » The only way to do this is to include regulatory considerations while creating/refreshing your strategy » How can we do that if the we don’t know what the future regulatory requirements will be? » Don’t we…? » Look to the sources of guidance » NIST cyber-security framework » Industry standards that have been referenced » Remain agile and flexible! 5

Challenge 4: Legal Landscape » Evolving case law » Choice Escrow – found responsible for a $400k ATO loss in 2010 » PATCO Construction – Bank found responsible for $580k ATO loss in 2009 » Jurisdictional differences » Example: Breach notifications standards by state CA SB1386 MASS 201CMR17 » International Differences Privacy laws, e.g. UK Data Protection Act » Liability concerns » Questions over offensive operations 6

Challenge 5: Industry Challenges » Information sharing » The airline pricing game…you first! » Liability » Reputational risk » Collaboration mechanism » Law Enforcement » How to collaborate » Laying the groundwork ahead of time » Internal » Socializing the role of security internally in your organization » Awareness amongst management & Board » Response preparedness 7

8