1 Jim Devlin Comptroller of the Currency November 5, 2009 Data Breaches in Payments Systems -- Roles and Best Practices for the Public and Private Sector.

Slides:



Advertisements
Similar presentations
Overview of Regional Investment Promotion and Facilitation Schemes -Possible Applications in the SEE 10 th Meeting of the South East European Investment.
Advertisements

Homeland Security Information Network-Emergency Management (HSIN-EM) Fire Service Community Overview Technologies for Critical Incident Preparedness Conference.
DEFENSE SUPPORT OF CIVIL AUTHORITIES (DSCA)
1 Pipeline Security Presented to: Pipeline Safety Trust New Orleans, Louisiana November 5, 2010.
TRANSPORTATION AND CARGO SECURITY Presented by : Aysar Naserallah.
The U.S. Coast Guard’s Role in Cybersecurity
1 Federal Communications Commission Public Safety and Homeland Security Bureau NARUC Summer Committee Meetings Dallas, Texas July 13, 2014 Clete D. Johnson.
Connecting for a Resilient America 1 C ONNECTING FOR A R ESILIENT A MERICA Ramesh Kolluru, Ph.D. Executive Director, NIMSAT Institute June 3, 2010.
National Forest Programs and Poverty Reduction Strategies Lusaka, Zambia 25 September 2006 Preliminary Findings - Zambia.
Comptroller of the Currency Administrator of National Banks E- Security Risk Mitigation: A Supervisor’s Perspective Global Dialogue World Bank Group September.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
After the crisis: Changes in Regulation in Europe... - the most important trends and influences upon the insurance market Michaela Koller, director general,
Session 5Slide 5-1 Risk Management In the Private Sector Session 5 Slide Deck.
Food and Agriculture Sector Coordinating Councils John L. Williams, DVM U.S. Department of Agriculture AFDO Annual Conference Kansas City, MO June 7, 2005.
Public-Private Partnerships in Action: Emergency Response
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
The U. S. National Strategy for Global Supply Chain Security Neema Khatri Office of International Affairs U.S. Department of Homeland Security.
Jeju, 13 – 16 May 2013Standards for Shared ICT CYBERSECURITY-RELATED STANDARDS ACTIVITY IN THE TELECOMMUNICATIONS INDUSTRY ASSOCIATION Eric Barnhart, Fellow.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
© 2014 WESTERN DIGITAL CORP. ALL RIGHTS RESERVED. Company Confidential Legislative & Regulatory Activities Involving Cyber Security Bob Bowen May 2015.
THE REGIONAL MUNICIPALITY OF YORK Information Technology Strategy & 5 Year Plan.
APPROVED JULY 2014 GACAG Overview APPROVED JULY 2014 Role of GACAG GACAG Overview Priorities and position statements GACAG Priorities GACAG's.
Nuclear Power Plant/Electric Grid Regulatory Coordination and Cooperation - ERO Perspective David R. Nevius and Michael J. Assante 2009 NRC Regulatory.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
Critical Infrastructure Protection Overview Building a safer, more secure, more resilient America The National Infrastructure Protection Plan, released.
Critical Infrastructure Protection: Program Overview
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
© BITS BITS and FSSCC R&D Efforts John Carlson Senior Vice President of BITS Panel on Data Breaches in Payments Systems-- Roles and Best Practices.
Cyber Security & Fraud – The impact on small businesses.
Supervision of Information Security and Technology Risk Barbara Yelcich, Federal Reserve Bank of New York Presentation to the World Bank September 10,
Presenter’s Name June 17, 2003 Nationwide Perspective: Building a Nationwide Network for Public Safety Dusty Rhoads Office of Emergency Communications.
Fiscal and other Policies to Leverage Private Sector Finance.
Daniel Kull Senior Disaster Risk Management Specialist Global Facility for Disaster Reduction and Recovery (GFDRR) World Bank Geneva, 19 November, 2012.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Information Security: It’s Everyone’s Business September 16, 2003 Greg Garcia, Vice President, Information Security ITAA.
Risk and Crisis Management Building OECD Principles on Country Crisis Management.
1 State Homeland Security: Priorities and Funding R. Chris McIlroy Homeland Security and Technology Division National Governors Association.
Chapter 3 Strategic Information Systems Planning.
Exercise 3 What is Necessary to build a Framework NATO Advanced Research Workshop “Best Practices and Innovative Approaches to Develop Cyber Security and.
The State Climatologist Program and a National Climate Services Initiative Mark A. Shafer Oklahoma Climatological Survey University of Oklahoma.
Business Crisis and Continuity Management (BCCM) Class Session
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
Exploring Service-Oriented Architecture (SOA) to Support Justice-Related Information Sharing Steven E. Correll, Chair Global Infrastructure/Standards Working.
GJP, CB and SJD Turin September 6, Global Jobs Pact ( June 2009 ) The Global Jobs Pact was adopted by the 2009 International Labour Conference following.
FBIIC - FSSCC Cyber Security Committee Executive Committee Update April 5, 2012 Resiliency Management Committee Committee Mission & Objectives Enable a.
Financial Services Sector Coordinating Council (FSSCC) 2011 KEY FSSCC INITIATIVES 2011 Key FSSCC Initiatives Project Name: Project Description: All-Hazards.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
1© Copyright 2011 EMC Corporation. All rights reserved. Workshop for Security Strategy Review Name, Title RSA, The Security Division of EMC.
World Bank Safeguards Review and Update
Dejene Abesha, RED&FS Secretariat
Strengthening Dialogue and Building Trust April 2017
Information Security Program
Information Technology Sector
U.S. COAST GUARD CYBERSECURITY POLICY and CYBERSECURITY PLANNING
8 Building Blocks of National Cyber Strategies
Financial Reporting Update FMI- November 26, 2008
1Georgia Institute of Technology 2Chicago Booth School of Business
Office of the Comptroller of the Currency
Role for Electric Sector in Critical Infrastructure Protection R&D
John M. Felker Director, NCCIC.
John Carlson Senior Director, BITS
On 23 September 2014 at UN HQ in New YORk
Resilience Framework Mark Lauby, Senior Vice President and Chief Reliability Officer WIRES Winter Meeting February 15, 2018.
The CISOs Role in Shaping Public Policy
Securing Critical Chemical Assets: The Responsible Care® Security Code
C/CAG Water Committee Meeting September 21, 2018
C/CAG Water Committee Meeting September 21, 2018
CYBER SECURITY SPACE OPERATIONS AND RESILIENCY.
CYBER RISKS IN SECURITIES SERVICES
Presentation transcript:

1 Jim Devlin Comptroller of the Currency November 5, 2009 Data Breaches in Payments Systems -- Roles and Best Practices for the Public and Private Sector Response Emerging Retail Payments Risk Issues: AN INDUSTRY, REGULATORY & LAW ENFORCEMENT DIALOGUE November 5-6 * Atlanta, GA

2 Framework for the Private Sector – Public Sector Response Mission Statement Work with the financial services sector to strengthen cyber security and resiliency of the sector’s current and future IT operations FBIIC-FSSCC Cyber Security Committee

3 Framework for the Private Sector – Public Sector Response To strengthen the cyber security and resilience of the sector’s current and future operations. To understand the current level of protection in the sector, and to develop recommendations for policy, education, best practices, and exercises to strengthen the sector’s resiliency to cyber threats. To leverage resources of the Federal Government to improve the sector’s awareness of potential cyber threats and vulnerabilities. To develop a single voice within the sector to interact with and respond to requests from the government and other sectors. FBIIC-FSSCC Cyber Security Committee Objectives

4 Framework for the Private Sector – Public Sector Response FBIIC-FSSCC Joint Cyber Security Committee Long Range Vision Exercise and Planning International Issues Information Sharing - Develop and execute Cyber Security Exercise - Update Supporting Protocols and Plans - Provide S-level Clearances for FS Critical People - Develop Roadmap for Improved Info Sharing - Develop framework for risk management issues - Develop telecomm prioritized resilience plan - What new threats / risks will arise? - What leap-ahead IT investments are needed?

5 What’s Been Done --- What’s on the Drawing Board FBIIC-FSSCC Joint Cyber Security Committee Long Range Vision Exercise and Planning Information Sharing International Issues December 2008 September 2009 Situational Analysis Problem States Roadmap Security Clearances Mobile DevicesR & D Agenda Supply Chain Undersea Cables International Outreach Threat Matrix How future Business decisions will drive changes in IT to support globalization

6 What’s Been Done --- What’s on the Drawing Board FBIIC-FSSCC Joint Cyber Security Committee Long Range Vision Exercise and Planning Information Sharing International Issues December 2008 September 2009 Situational Analysis Problem States Roadmap Security Clearances Mobile DevicesR & D Agenda Supply Chain Undersea Cables International Outreach Threat Matrix How future Business decisions will drive changes in IT to support globalization

7 What’s Been Done --- What’s on the Drawing Board FBIIC-FSSCC Joint Cyber Security Committee Long Range Vision Exercise and Planning Information Sharing International Issues December 2008 September 2009 Situational Analysis Problem States Roadmap Security Clearances Mobile DevicesR & D Agenda Supply Chain Undersea Cables International Outreach Threat Matrix How future Business decisions will drive changes in IT to support globalization

8 What’s Been Done --- What’s on the Drawing Board FBIIC-FSSCC Joint Cyber Security Committee Long Range Vision Exercise and Planning Information Sharing International Issues December 2008 September 2009 Situational Analysis Problem States Roadmap Security Clearances Mobile DevicesR & D Agenda Supply Chain Undersea Cables International Outreach Threat Matrix How future Business decisions will drive changes in IT to support globalization