Thales Cyber Assurance Webinar Your first step to Cyber Security
|
|
- Jack Gibson
- 5 years ago
- Views:
Transcription
1 Thales Cyber Assurance Webinar Your first step to Cyber Security 10 February 2012 Ross Parsell/Edward Wolton 2012 Thales UK Ltd.
2 2 / Edward Wolton Edward has been working in what is now called Cyber Security for fifteen years and has watched the information security industry slowly evolve over that time to focus on business outputs rather than technology for technology s sake. Previously CISO for Accenture at QinetiQ and head of Accenture s UK Government Security consulting team, Edward has run his own consulting business and was until recently an Information Assurance strategy consultant to HMG. In his lighter moments, Edward was also responsible for the growth of the Young Professionals Group within the British Computer Society and having recently been elected Liveryman of the City of London he remains an advocate for promoting young people and skills and looks forward to retiring on their success in the future. Edward is now Thales Head of Cyber Security and represents the company with the Cyber Virtual Task Force, a cross-industry information-sharing collaboration.
3 3 / Ross Parsell Ross Parsell is the Key Account Director for Government and Commercial for Thales UK s Security and C4I areas. Ross has recently changed roles having been the Managing Director for the EMEA region and Chief Operating Officer for the e-security activities globally within Thales. Ross has recently been working with the Cabinet Office covering the Cyber Strategy for the UK contributing a broad experience covering sectors such as Banking and Finance, Enterprise and High Grade cryptographic security. Ross is from an Engineering background. He joined Thales from Ultra Electronics Datel where he was Managing Director. During this period he delivered many large projects including the avionics software programme for Tornado, new contracts with Boeing on the 787, the PC21 new trainer aircraft mission system for Pilatus, secure networks for the UK MOD and secure e- business solutions. Prior to this, Ross held the positions of Business Unit Director, Sales/Business Development Director and Manager of Staff Contracting in the Datel Division of the Ultra Electronics Group. Ross has also had previous experience with SME companies supplying fibre optic solutions to the Highways agency and London Underground for the transmission of CCTV images and control. Ross started his career working on Security products and services as an engineer through to sales support. Ross holds a Bachelor Degree in Metals and Materials Technology from Manchester University and is a Chartered Director of the Institute of Directors. Ross has also served with the Territorial Army with the Royal Signals achieving the rank of Major.
4 4 / Example interview with a Chief Executive So you think you know about Cyber Security?
5 5 / You might think 1. Security is about secrets
6 6 / You might think 1. Security is about secrets 2. Security costs too much
7 7 / You might think 1. Security is about secrets 2. Security costs too much 3. Security is 'fit and forget'
8 8 / You might think 1. Security is about secrets 2. Security costs too much 3. Security is 'fit and forget' 4. You can buy "security in a box"
9 9 / You might think 1. Security is about secrets 2. Security costs too much 3. Security is 'fit and forget' 4. You can buy "security in a box" 5. Patching is all you need to do to protect a system
10 10 / You might think 1. Security is about secrets 2. Security costs too much 3. Security is 'fit and forget' 4. You can buy "security in a box" 5. Patching is all you need to do to protect a system 6. Cyber is about electronic security solutions
11 11 / You might think 1. Security is about secrets 2. Security costs too much 3. Security is 'fit and forget' 4. You can buy "security in a box" 5. Patching is all you need to do to protect a system 6. Cyber is about electronic security solutions 7. Cyber security is a one-off project
12 12 / You might think 1. Security is about secrets 2. Security costs too much 3. Security is 'fit and forget' 4. You can buy "security in a box" 5. Patching is all you need to do to protect a system 6. Cyber is about electronic security solutions 7. Cyber security is a one-off project 8. I have anti-virus and a firewall installed, so my network/computer is safe
13 13 / You might think 1. Security is about secrets 2. Security costs too much 3. Security is 'fit and forget' 4. You can buy "security in a box" 5. Patching is all you need to do to protect a system 6. Cyber is about electronic security solutions 7. Cyber security is a one-off project 8. I have anti-virus and a firewall installed, so my network/ computer is safe 9. External threats are the priority
14 14 / Cyber Risk means different things to Apr. 2011, PSN Hacking G O V E R N M E N T S
15 15 / Cyber Risk means different things to C O M P A N I E S May 2011, RSA Advanced Persistent Threat Apr. 2011, PSN Hacking
16 16 / Cyber Risk means different things to Social engineering Credit card cloning Identity theft Y O U & M E
17 17 / Exponential rise in attacks Cyber-attacks on UK at disturbing levels, warns GCHQ chief. 'Exponential rise' in attacks on departments, industry and public reveal global cyber crime marketplace: I can attest to attempts to steal British ideas and designs in the IT, technology, defence, engineering and energy sectors, as well as other industries to gain commercial advantage or to profit from secret knowledge of contractual arrangements." Iain Lobban, Director GCHQ, 31 Oct 2011
18 18 / Cyber Security for Companies The impact of a cyber attack may be devastating upon a company. Examples of corporate risk include: u Loss of productivity through cyber attack on IT Indicative: 1 week for 5000-head 75/hr = 15m u Revenue decline through loss of intellectual property Loss of market share due to competition getting to market quicker/better/cheaper Loss of market entry following hacked bid win price u Reputation loss through not taking appropriate mitigating actions Brand devaluation resulting in loss of customer trust; fall in share price Regulator/legislative fines Results in exclusion to tender for new contracts Good Cyber Security through management of evolving threats can prevent significant loss of revenue / reputation and increase competitive advantage.
19 19 / How do cyber attacks happen? The architecture of Cyber Attacks: u u Through Corporate IT systems Through employees home IT and social network sites exploiting technical, human and physical vulnerabilities
20 20 / Thales Cyber Security 9 out of 10 of the world s leading technology companies 19 out of the world s 20 top banks and financial companies The world s 3 largest pharmaceutical companies The top 4 global energy companies 70% of worldwide financial transactions Number One European supplier for Government Information Security (50 countries, 25 NATO countries) In the UK, Cyber Security delivered for: Watchkeeper Unmanned Aerial Vehicle Galileo Positioning Satellites South East Water Chinook helicopters National Express Group Type 26 Global Combat Ship A Large Defence Prime Contractor
21 21 / Why Thales? u 40 years of proven UK expertise and references in providing Cyber Security to Critical National Infrastructure, Government, Military and Commercial customers; u Delivering Cyber Security across 50 countries, with a global network of partners that provides us the agility to pull-through market leading Cyber Security technologies, whilst retaining for our customers a single point of contact; u Over 400 Cyber and Security specialists with domain expertise across the complete Cyber spectrum; u Supporting innovation through smallto-medium enterprises and academia.
22 22 /
23 23 / Step by Step approach The Route to Cyber Security: Training, Education & Awareness Recognise there s a problem and act Policy and procedure analysis Holistic Security Audit Vulnerability Analysis Penetration Testing Assessment of risks and findings Agree mitigating actions Engage in solution design Implementation Ongoing Continual Assessment Loop Plan, do, check, review You are here Thales Cyber Assurance: - Holistic Security Audit - Vulnerability Assessment - Penetration Testing Report and recommendations Thales Cyber Maturity: - Secure Architecture (design, build, test and run) - Secure Hosting (managing bespoke services) - Thales products and services (enabling through managed cryptography) - Cyber Security Training, Education & Awareness - Systems Accreditation - Crisis Response
24 24 / So what you re saying is.. 1. The Cyber threat is real, growing and here now 2. It affects us all but each organisation has different risks 3. Cyber Security is a BOARD LEVEL DECISION 4. No need to spend more re-direct existing budget 5. ACT NOW take the first step to understand your cyber risk
25 25 / Where to start?
26 26 / Thales Cyber Assurance Understand your cyber risk 3 Elements included: 1. Vulnerability Assessment 2. Penetration Testing 3. Holistic Security Audit Vulnerability Assessment
27 Take the Next Step Ali McHardy Thales Client Contact Thales UK Ltd.
28 Thales Cyber Assurance Webinar Q & A Ali McHardy Thales Client Contact alistair.mchardy@uk.thalesgroup.com Thales UK Ltd.
29 Thales Cyber Assurance Webinar Thank you for attending Ali McHardy Thales Client Contact Thales UK Ltd.
Security Awareness Training Courses
Security Awareness Training Courses Trusted Advisor for All Your Information Security Needs ZERODAYLAB Security Awareness Training Courses 75% of large organisations were subject to a staff-related security
More informationCustomer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach
Customer Breach Support A Deloitte managed service Notifying, supporting and protecting your customers through a data breach Customer Breach Support Client challenges Protecting your customers, your brand
More informationCyber Security Strategy
Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from
More informationIncentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO
White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating
More informationCYBER SECURITY TRAINING
CYBER Security skills for the digital age. Cyber Crime has never been more predominant. The number of breaches is exponentially rising year on year leading to an ever increasing Cyber Security threat.
More informationDefence services. Independent systems and technology advice that delivers real value. Systems and Engineering Technology
Defence services Independent systems and technology advice that delivers real value Systems and Engineering Technology Frazer-Nash Consultancy Working in the UK and internationally, Frazer-Nash is making
More informationElectronic warfare, information and cyber
Electronic warfare, information and cyber 2018-2019 Symposia Symposia at Shrivenham provides a forum to Government agencies, military and civilian, industry and research establishments for the exploration
More informationCybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016
Cybersecurity: Considerations for Internal Audit Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016 Agenda Key Risks Incorporating Internal Audit Resources Questions 2 San Francisco
More informationPosition Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.
Position Description Engagement Manager Business unit: Position purpose: Direct reports: Directorate overview: Business Unit Overview Remuneration indicator: Outreach & Engagement Information Assurance
More informationCybersecurity. Securely enabling transformation and change
Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why
More informationBIG DATA INDUSTRY PAPER
BIG DATA INDUSTRY PAPER Encryption Key Management INFORMATION-RICH BIG DATA IS UNDER INCREASING THREAT OF THEFT AND BUSINESS DISRUPTION. AS THE NETWORKS AND TECHNOLOGIES THAT ENABLE BIG DATA COLLECTION,
More informationSYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security
SYMANTEC: SECURITY ADVISORY SERVICES Symantec Security Advisory Services The World Leader in Information Security Knowledge, as the saying goes, is power. At Symantec we couldn t agree more. And when it
More informationCYBERAID + The Cyber Solution for UK SMEs THBGROUP.COM
CYBERAID + The Cyber Solution for UK SMEs THBGROUP.COM The Cyber Security threat Cyber Security is consistently one of the top three risks faced by UK businesses to ensure that adequate protection is in
More informationDigital Health Cyber Security Centre
Digital Health Cyber Security Centre Current challenges Ransomware According to the ACSC Threat Report 2017, cybercrime is a prevalent threat for Australia. Distributed Denial of Service (DDoS) Targeting
More informationGovernance Ideas Exchange
www.pwc.com.au Anatomy of a Hack Governance Ideas Exchange Robert Di Pietro October 2018 Cyber Security Anatomy of a Hack Cyber Security Introduction Who are the bad guys? Profiling the victim Insights
More informationDoing Business with Defence. Opportunities and Innovation in the Defence Supply Chain
Over the next decade we are committed to spending over 178Bn on equipment and support. Defence has a major role to play in delivering the government s growth and enterprise agenda the MOD accounts for
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationMaintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery
Maintaining Resiliency Within the Defense Industrial Base Through Preparedness Response and Recovery Dave Komendat Chief Security Officer The Boeing Company What We Do Today Design, assemble and support
More informationDriving Global Resilience
Driving Global Resilience Steve Mellish FBCI Chairman, The Business Continuity Institute Monday December 2nd, 2013 Business & IT Resilience Summit New Delhi, India Chairman of the Business Continuity Institute
More information2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: THE THIRD ANNUAL SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN EUROPE February 2014 Sponsored by: 2014 Network Security & Cyber Risk Management:
More informationKey Findings from the Global State of Information Security Survey 2017 Indonesian Insights
www.pwc.com/id Key Findings from the State of Information Security Survey 2017 n Insights Key Findings from the State of Information Security Survey 2017 n Insights By now, the numbers have become numbing.
More informationSPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES
SPECIALIST CYBER SECURITY SERVICES & CYBER VULNERABILITY HEALTH CHECK FOR SMALLER COMPANIES Dear Executive, you requested more information, here are three quick questions Would you know if your company
More informationUK Permanent Salary Index November 2013 Based on registered vacancies and actual placements
UK Permanent Salary Index ember 1 SYSTEM INTEGRATORS & CONSULTANCIES Job Title Guidelines 8 9 2010 2011 2012 Information & Risk IT Officer Project & Risk Consultant Analyst Part of a team in a large organisation
More informationHelping our customers master every decisive moment
Helping our customers master every decisive moment Thales Group overview www.thalesgroup.com Overview Over 80,000 employees 68 Countries Global presence 1bn Self-funded R&D* * Does not include externally
More informationHelping our customers master every decisive moment
Helping our customers master every decisive moment Thales Group overview www.thalesgroup.com MORE THAN Overview 65,000 employees 60 Countries. Global presence 797 million Self-funded R&D* 2017 * Does not
More informationCyber Security Issues and Responses. Andrew Rogoyski Head of Cyber Security Services CGI UK
Cyber Security Issues and Responses Andrew Rogoyski Head of Cyber Security Services CGI UK andrew.rogoyski@cgi.com CGI in cyber security Credentials Clients We have over 35 years of experience working
More informationAFC Compliance Careers
AFC Compliance Careers ACAMS Education Program Date : December 6 th 2017 Donna Bucci Ireland Account Manager ACAMS ACAMS is a global community ACAMS is the world s largest international membership organisation
More informationCyber Security and Data Protection: Huge Penalties, Nowhere to Hide
Q3 2016 Security Matters Forum Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide Alan Calder Founder & Executive Chair IT Governance Ltd July 2016 www.itgovernance.co.uk Introduction
More informationfalanx Cyber ISO 27001: How and why your organisation should get certified
falanx Cyber ISO 27001: How and why your organisation should get certified Contents What is ISO 27001? 3 What does it cover? 3 Why should your organisation get certified? 4 Cost-effective security management
More informationPosition Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED
Position Description Computer Network Defence (CND) Analyst Position purpose: Directorate overview: The CND Analyst seeks to discover, analyse and report on sophisticated computer network exploitation
More informationDIGITAL TRUST Making digital work by making digital secure
Making digital work by making digital secure MARKET DRIVERS AND CHALLENGES THE ROLE OF IT SECURITY IN THE DIGITAL AGE 2 In today s digital age we see the impact of poor security controls everywhere. Bots
More informationISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015
ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO 27001 FRAMEWORK AUGUST 19, 2015 Agenda Coalfire Overview Threat Landscape What is ISO Why ISO ISO Cycle Q&A 2 Presenters
More informatione:
t: @crosswordcyber e: tom.clark@crosswordcybersecurity.com Risk Analysis Tool: www.rizikon.com Research Database: https://clue.crosswordcybersecurity.com The View From 2018 An exercise to identify emerging
More informationThe University of Queensland
UQ Cyber Security Strategy 2017-2020 NAME: UQ Cyber Security Strategy DATE: 21/07/2017 RELEASE:0.2 Final AUTHOR: OWNER: CLIENT: Marc Blum Chief Information Officer Strategic Information Technology Council
More informationA practical guide to IT security
Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or
More informationNine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
More informationAvanade s Approach to Client Data Protection
White Paper Avanade s Approach to Client Data Protection White Paper The Threat Landscape Businesses today face many risks and emerging threats to their IT systems and data. To achieve sustainable success
More informationBackground FAST FACTS
Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance
More informationA Brief Profile 2017
A Brief Profile 2017 Future Netwings Solutions India s leading ISO 9001:2008 Certified IT Services Organization Over 18 Years experience in IT Infrastructure Design, Build & Support Sales & Support locations
More informationAirport Security & Safety Thales, Your Trusted Hub Partner
Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international
More informationSOC for cybersecurity
April 2018 SOC for cybersecurity a backgrounder Acknowledgments Special thanks to Francette Bueno, Senior Manager, Advisory Services, Ernst & Young LLP and Chris K. Halterman, Executive Director, Advisory
More informationCESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK
CESG:10 Steps to Cyber Security WORKING WITH GOVERNMENT, INDUSTRY AND ACADEMIA TO MANAGE INFORMATION RISK Building resilience: 10 Steps to Cyber Security 1. Information Risk Management Regime 2. Secure
More informationInstitute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI
Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO CHAPTER: @IIACHI #IIACHI WWW.FACEBOOK.COM/IIACHICAGO HTTPS://WWW.LINKEDIN.COM/GROUPS/1123977 1 CAE Communications and Common Audit Committee
More information2017 Company Profile
2017 Company Profile LITS Lead Technology Services 10/2/2017 INTRODUCTION Leading Innovative Technology Solutions (LITS) Lead Innovative Technology Services is an affirmative and black economic empowerment
More informationCOMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN
COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING
More informationHow NSFOCUS Protected the G20 Summit. Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity
How NSFOCUS Protected the G20 Summit Guy Rosefelt on the Strategy, Staff and Tools Needed to Ensure Cybersecurity SPONSORED BY Rosefelt is responsible for developing NSFOCUS threat intelligence and web
More informationBringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016
Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the
More informationBHConsulting. Your trusted cybersecurity partner
Your trusted cybersecurity partner BH Consulting Securing your business BH Consulting is an award-winning, independent provider of cybersecurity consulting and information security advisory services. Recognised
More informationNATO ACT Industry Day 12 th September 2011, London. Alberto de Benedictis Chief Executive Finmeccanica UK
Small and Medium business contribution to capability development NATO ACT Industry Day 12 th September 2011, London Alberto de Benedictis Chief Executive Finmeccanica UK Finmeccanica: Providing real capability
More informationState Governments at Risk: State CIOs and Cybersecurity. CSG Cybersecurity and Privacy Policy Academy November 2, 2017
State Governments at Risk: State CIOs and Cybersecurity CSG Cybersecurity and Privacy Policy Academy November 2, 2017 About NASCIO National association representing state chief information officers and
More informationJane s Defence Industry & Markets Intelligence Centre. Develop Advantage. Mitigate Risk. Capture Opportunity.
Jane s Defence Industry & Markets Intelligence Centre Develop Advantage. Mitigate Risk. Capture Opportunity. OVERVIEW A challenging marketplace The global A&D industry is facing an increasingly volatile,
More informationThe State of Cybersecurity and Digital Trust 2016
The State of Cybersecurity and Digital Trust 2016 Identifying Cybersecurity Gaps to Rethink State of the Art Executive Summary Executive Summary While the advent of digital technology has fueled new business
More informationCase Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform
Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform Summary For the University of Aberdeen, protecting IT infrastructure serving
More informationCybersecurity Session IIA Conference 2018
www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that
More informationNY State s Cybersecurity Legislation Requirements for Risk Management, Security of Applications, and the Appointed CISO
NY State s Cybersecurity Legislation Requirements for Risk Management, Security of Applications, and the Appointed CISO June 28, 2017 Alan Calder IT Governance Ltd www.itgovernanceusa.com PLEASE NOTE THAT
More informationPOSITION DESCRIPTION
UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:
More informationCyber Crime Seminar 8 December 2015
Cyber Crime Seminar The Cyber Contest Jon Rigby Director of Cyber, AlixPartners @uktisa December 2015 Cyber-Crime What is Reasonable? Jon Rigby AlixPartners Cyber Security (http:///en/services/informationmanagement/cybersecurity.aspx)
More informationNew International Health and Safety Standard ISO 45001
New International Health and Safety Standard ISO 45001 By Mr. Coleman Tse, Sales & Marketing Director, BSI Hong Kong 4/24/2015 Who is BSI? Royal Charter Status focused on the development of standards,
More informationCyber Security School
Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government
More informationCyber risk Getting the boardroom focus right
Cyber risk Getting the boardroom focus right Cyber attacks have become substantially more malicious and larger scale over last few years, causing much greater harm to organisations and elevating cyber
More informationCYBER SECURITY AND THE PENSIONS INDUSTRY Karen Tasker 1 February 2018
CYBER SECURITY AND THE PENSIONS INDUSTRY Karen Tasker 1 February 2018 What s the relevance for pension schemes? What do cyber risks look like? What should Trustees be doing? Cyber risk means any risk of
More informationPOSITION DESCRIPTION
Network Security Consultant POSITION DESCRIPTION Unit/Branch, Directorate: Location: Regulatory Unit Information Assurance and Cyber Security Directorate Auckland Salary range: I $90,366 - $135,548 Purpose
More informationRole Type Pay Band Location Duration Reports to: To manage, enhance and embed the British Council Nigeria Security Risk Management function.
Role Title Head of Security Nigeria Role Information Role Type Pay Band Location Duration Reports to: Advisory, policy and expertise 8 Lagos or Abuja Indefinite Director Operations Nigeria Role purpose
More informationRedefining IT distribution. The Portfolio. The Nuvias vendor portfolio
Redefining IT distribution The Portfolio The Nuvias vendor portfolio Distribution is changing and it starts here The world of IT is changing. The channel needs a new style of distributor to meet the demands
More informationCyberSecurity. Penetration Testing. Penetration Testing. Contact one of our specialists for more information CYBERSECURITY SERVICE DATASHEET
DATASHEET Gavin, Technical Director Ensures Penetration Testing Quality CyberSecurity Penetration Testing CHESS CYBERSECURITY CREST-ACCREDITED PEN TESTS PROVIDE A COMPREHENSIVE REVIEW OF YOUR ORGANISATION
More informationWEEE disposal and the creation of social value. Jon Selby Tier 1 Asset Management Ltd
WEEE disposal and the creation of social value Jon Selby Tier 1 Asset Management Ltd Why is Tier 1 here this evening? Every business needs to consider these Social Responsibility Data Security Cost Peace
More information2015 VORMETRIC INSIDER THREAT REPORT
Research Conducted by Research Analyzed by 2015 VORMETRIC INSIDER THREAT REPORT Trends and Future Directions in Data Security GLOBAL EDITION #2015InsiderThreat EXECUTIVE PERSPECTIVE 1 INSIDER THREATS:
More informationPictured is HMS Argyll with an idyllic scene of English countryside behind her.
Pictured is HMS Argyll with an idyllic scene of English countryside behind her. Department for International Trade Defence & Security Organisation Helping UK Companies to export www.gov.uk/dit-dso Our
More informationT-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE
www.thalesgroup.com/uk SECURE COMMUNICATIONS AND INFORMATION SYSTEMS T-SURE VIGILANCE CYBER SECURITY OPERATIONS CENTRE An enterprise-level bespoke security service for the detection and response to cyber
More informationPOSITION DESCRIPTION
POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose
More informationGEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards
GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationJeff Wilbur VP Marketing Iconix
2016 Data Protection & Breach Readiness Guide February 3, 2016 Craig Spiezle Executive Director & President Online Trust Alliance Jeff Wilbur VP Marketing Iconix 1 Who is OTA? Mission to enhance online
More informationThe UK s National Cyber Security Strategy
The UK s National Cyber Security Strategy 2016 2021 Vision for 2021: The UK is secure and resilient to cyber threats, prosperous and confident in the digital world 1 National Cyber Security Strategy 2016
More informationCyber Risks in the Boardroom Conference
Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks
More informationVirtustream Cloud and Managed Services Solutions for US State & Local Governments and Education
Data Sheet Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education Available through NASPO ValuePoint Cloud Services VIRTUSTREAM CLOUD AND MANAGED SERVICES SOLUTIONS
More informationToday s cyber threat landscape is evolving at a rate that is extremely aggressive,
Preparing for a Bad Day The importance of public-private partnerships in keeping our institutions safe and secure Thomas J. Harrington Today s cyber threat landscape is evolving at a rate that is extremely
More informationSecurity by Default: Enabling Transformation Through Cyber Resilience
Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,
More informationBUSINESS LECTURE TWO. Dr Henry Pearson. Cyber Security and Privacy - Threats and Opportunities.
BUSINESS LECTURE TWO Dr Henry Pearson Cyber Security and Privacy - Threats and Opportunities. Introduction Henry started his talk by confessing that he was definitely not a marketer, as he had been occupied
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationBRING EXPERT TRAINING TO YOUR WORKPLACE.
BRING EXPERT TRAINING TO YOUR WORKPLACE. ISACA s globally respected training and certification programs inspire confidence that enables innovation in the workplace. ISACA s On-Site Training brings a unique
More informationNCC Group plc. NCC Group plc Interim Results
NCC Group plc Interim Results for the six months ended 30 November 2007 NCC Group plc Manchester Technology Centre Oxford Road Manchester M1 7EF www.nccgroup.com January 2008 Agenda Highlights Acquisition
More informationSales Presentation Case 2018 Dell EMC
Sales Presentation Case 2018 Dell EMC Introduction: As a member of the Dell Technologies unique family of businesses, Dell EMC serves a key role in providing the essential infrastructure for organizations
More informationRetail Security in a World of Digital Touchpoint Complexity
Retail Security in a World of Digital Touchpoint Complexity Author Greg Buzek, President of IHL Services Sponsored by Cisco Systems Inc. Featuring industry research by Previously in part 1 and part 2 of
More informationDefence & Security Industrial Engagement Policy
Defence & Security Industrial Engagement Policy Adrian Dalton, International Relations Group, Ministry of Defence Defence & Security Industrial Engagement Policy (DSIEP) Pre DSIEP Transition to new policy
More informationItu regional workshop
Itu regional workshop "Key Aspects of Cybersecurity in the Context of Internet of Things (IoT) Natalia SPINU 18 September, 2017 Tashkent, Uzbekistan AGENDA 1. INTRODUCTI ON 2. Moldovan public policy on
More informationCombating Cyber Risk in the Supply Chain
SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an
More informationSTRUCTURED CABLING UK WIDE SERVICES
STRUCTURED CABLING UK WIDE SERVICES Page 1 STRUCTURED CABLING UK WIDE SERVICES Contents 4 Section 1: Cabling Overview 5 Section 2: Our Partners 6 Section 3: Innovation 7 Section 4: Managed Services 8 Section
More informationBusiness continuity management and cyber resiliency
Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,
More information2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:
2014 NETWORK SECURITY & CYBER RISK MANAGEMENT: A SURVEY OF ENTERPRISE-WIDE CYBER RISK MANAGEMENT PRACTICES IN THE ASIA-PACIFIC REGION April 2014 Sponsored by: 2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:
More informationTraining and Certifying Security Testers Beyond Penetration Testing
Training and Certifying Security Testers Beyond Penetration Testing Randall W. Rice, CTAL (Full), CTAL-SEC Director, ASTQB Board of Directors www.astqb.org Most organizations do not know the true status
More informationSUPERYACHTS SECURITY SERVICES
SUPERYACHTS SECURITY SERVICES EOS Risk s dedicated Superyacht solutions division are a leading provider of large yacht services and offer a comprehensive portfolio of fully tailorable solutions of unparalleled
More informationIP Risk Assessment & Loss Prevention By Priya Kanduri Happiest Minds, Security Services Practice
IP Risk Assessment & Loss Prevention By Priya Kanduri Happiest Minds, Security Services Practice IP Risk Assessment & Loss Prevention Often when organizations are expanding rapidly, they do not give sufficient
More informationACAMS (Association of Certified AML Specialist)
ACAMS (Association of Certified AML Specialist) Founded in 2001 Largest international membership organisation dedicated to enhancing the knowledge, skills and expertise of AML/CTF and financial crime detection
More informationDHS Cybersecurity. Election Infrastructure as Critical Infrastructure. June 2017
DHS Cybersecurity Election Infrastructure as Critical Infrastructure June 2017 Department of Homeland Security Safeguard the American People, Our Homeland, and Our Values Homeland Security Missions 1.
More informationFostering Competitiveness, Growth and Jobs. Wrocław, Poland, 15 October 2014
e-skills Fostering Competitiveness, Growth and Jobs Wrocław, Poland, 15 October 2014 The e-skills Pyramid e-leaders e-leadership skills): these correspond to the capabilities needed to exploit opportunities
More informationSRM Service Guide. Smart Security. Smart Compliance. Service Guide
SRM Service Guide Smart Security. Smart Compliance. Service Guide Copyright Security Risk Management Limited Smart Security. Smart Compliance. Introduction Security Risk Management s (SRM) specialists
More informationWe Make IT Simple. IT Support and Security Specialists.
We Make IT Simple. IT Support and Security Specialists. Contents Intro... 4-5 Telecoms... 18-19 IT Support... 6-7 CCTV... 20-21 IT Security... 8-9 Cyber Essentials... 22-23 Cloud Solutions... 10-11 GDPR...
More informatione2e Managed Customer Cloud Infrastructure Service Service Definition Document
1 e2e Managed Customer Cloud Infrastructure Service Service Definition Document OVERVIEW A range of Cloud infrastructure managed services where the customer buys or already owns the Infrastructure but
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More information