Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

Size: px
Start display at page:

Download "Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business"

Transcription

1 Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

2 Women Impacting Public Policy (WIPP) is a nonprofit, membership organization working to increase the economic power and public policy clout of women entrepreneurs by providing essential business skills education, leadership opportunities for business and personal growth, and a seat at the table among policymakers in Washington, D.C. WIPP was founded in 2001 and is recognized as a national, nonpartisan voice for women business owners, advocating on behalf of its coalition of 4.7 million businesswomen including 78 business organizations. WIPP identifies important trends and opportunities and provides a collaborative model for the public and private sectors to advance the economic empowerment of women.

3 Give Me 5 National program from WIPP & American Express OPEN designed to educate women business owners on how to apply for and secure federal procurement opportunities. Give Me 5 works to increase the representation of Women Business Owners that win government contracts. We provide accessible business education tools to assist both new and experienced federal contractors. Women Business Owners could gain more than $4 billion in annual revenues if the 5% contracting goal set by Congress was reached.

4 Your Voice - Be heard!

5 Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

6 Instructor Angela Dingle, President Ex Nihilo Management, LLC Women Impacting Public Policy (WIPP) Education Foundation Board of Directors Certified in the Governance of Enterprise Information Technology (CGEIT) Managed over $40 million in Government Contracts

7 If you hire or manage employees, contractors or subcontractors; own a business or manage information, this session is for you. Introduction

8 Course Goals Understand the Need Understand Your Responsibilities Understand How to Protect Your Business

9 Cyber Security Defined Cyber Security is a collection of policies, procedures, practices and technologies designed to protect networks, computers, programs and data from attack, damage or unauthorized access.

10 Understanding the Need Source: SecureID News, 2016

11 Understanding the Need 21.5 Million SSNs 5.6 Million Fingerprints 4.2 Million Personnel Records 13 Months Undetected How did we find out?

12 Understanding the Need 720,000 Compromised Taxpayer Accounts Undetected for 16 Months Aggregation of Data Hack or Data Breach?

13 Understanding the Need Edward Snowden Former Military Federal Contractor Top Secret Clearance Polygraph Exam Computer Professional Insider Threat

14 Understanding the Need Notification of problem by a customer, law enforcement, coworker, informant, auditor or other external person who becomes suspicious Detection by law enforcement investigators

15 How It Impacts Your Business Negative Media Attention Inability to Conduct Business Data Loss System Damage Loss of Corporate Trade Secrets Damaged Corporate Reputation Website Defacement

16 How it Impacts Your Business Potential Loss of Life Personal Injury Identity Theft Financial Damages False Accusations Co-Worker Threats Unclear or Unmet Expectations

17 How It Impacts Your Business Technology Standards Federal Acquisition Regulations Personnel Security Policies Access Controls

18 How it Impacts Your Business Increased Contractual Responsibility Application Across All Disciplines Potential Cost Increases Potential Audits Delayed Security Clearance Processing Increased Reporting Requirements Financial Penalties or Fines Contract Loss

19 Protecting Your Business Educate Yourself and Your Staff Review Contracts to Understand Responsibilities Implement Appropriate Policies and Technologies Inspect What You Expect Consult with a Professional Expert to Assist

20 Review Cyber security affects all government contractors not just IT providers You have a responsibility to implement and enforce cyber security policy within your organization Failure to do so could be costly Early adopters could have a competitive advantage

21 Questions? Angela Dingle, President Phone: (202)

22 Thank You For Participating Following this call you will receive links to the podcast of this session. For questions, please contact Lin Stuart at

23 Your Voice - Be heard!

24 Get Involved! Join a policy issue committee and learn how policy can impact your business growth Make your voice heard - become a member of our national Instant Impact Advocacy Team Participate in our educational series unlimited opportunities for you and your staff Receive weekly policy updates and briefings WIPP Questions? Contact WIPP Staff Program & Education Coordinator: Lin Stuart LStuart@wipp.org (415) Membership Coordinator: Lynn Bunim LBunim@wipp.org (415)

2017 RIMS CYBER SURVEY

2017 RIMS CYBER SURVEY 2017 RIMS CYBER SURVEY This report marks the third year that RIMS has surveyed its membership about cyber risks and transfer practices. This is, of course, a topic that only continues to captivate the

More information

Cyber Risks in the Boardroom Conference

Cyber Risks in the Boardroom Conference Cyber Risks in the Boardroom Conference Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks

More information

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure Executive Order 13800 Update July 2017 In Brief On May 11, 2017, President Trump issued Executive Order 13800, Strengthening

More information

Collaboration on Cybersecurity program between California University and Shippensburg University

Collaboration on Cybersecurity program between California University and Shippensburg University Collaboration on Cybersecurity program between California University and Shippensburg University Weifeng Chen Dept. of Math, Computer Science and Information Systems California University, California,

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

The CERT Top 10 List for Winning the Battle Against Insider Threats

The CERT Top 10 List for Winning the Battle Against Insider Threats The CERT Top 10 List for Winning the Battle Against Insider Threats Dawn Cappelli CERT Insider Threat Center Software Engineering Institute Carnegie Mellon University Session ID: STAR-203 Session Classification:

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Opening Doors to Cyber and Homeland Security Careers

Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Opening Doors to Cyber and Homeland Security Careers Today s Presenters: Frederic Lemieux, Ph.D. Professor and Program Director, Cybersecurity Strategy

More information

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY

Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY Your CONNECTION to the CREDENTIALING COMMUNITY JOIN TODAY ACHIEVE SUCCESS with ICE ICE has given me a real edge in knowing more about the intricacies of credentialing and connecting with others in the

More information

The Insider Threat Center: Thwarting the Evil Insider

The Insider Threat Center: Thwarting the Evil Insider The Insider Threat Center: Thwarting the Evil Insider The CERT Top 10 List for Winning the Battle Against Insider Threats Randy Trzeciak 14 June 2012 2007-2012 Carnegie Mellon University Notices 2011 Carnegie

More information

Security and Privacy Governance Program Guidelines

Security and Privacy Governance Program Guidelines Security and Privacy Governance Program Guidelines Effective Security and Privacy Programs start with attention to Governance. Governance refers to the roles and responsibilities that are established by

More information

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)

KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for

More information

APMP Certification. Webinar presentation by: Mark Wigginton Regional Director, Shipley Associates September 11, 2013

APMP Certification. Webinar presentation by: Mark Wigginton Regional Director, Shipley Associates September 11, 2013 APMP Certification Webinar presentation by: Mark Wigginton Regional Director, Shipley Associates September 11, 2013 Webinar Agenda Overview of APMP Certification Program 3 Levels of certification Qualifications

More information

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015

Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report. November 19, 2015 Standing Together for Financial Industry Resilience Quantum Dawn 3 After-Action Report November 19, 2015 Table of contents Background Exercise objectives Quantum Dawn 3 (QD3) cyberattack scenario QD3 results

More information

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm Insider Threat Program: Protecting the Crown Jewels Monday, March 2, 2:15 pm - 3:15 pm Take Away Identify your critical information Recognize potential insider threats What happens after your critical

More information

Legal, Ethical, and Professional Issues in Information Security

Legal, Ethical, and Professional Issues in Information Security Legal, Ethical, and Professional Issues in Information Security Downloaded from http://www.utc.edu/center-information-securityassurance/course-listing/cpsc3600.php Minor Changes from Dr. Enis KARAARSLAN

More information

Business continuity management and cyber resiliency

Business continuity management and cyber resiliency Baker Tilly refers to Baker Tilly Virchow Krause, LLP, an independently owned and managed member of Baker Tilly International. Business continuity management and cyber resiliency Introductions Eric Wunderlich,

More information

Clarity on Cyber Security. Media conference 29 May 2018

Clarity on Cyber Security. Media conference 29 May 2018 Clarity on Cyber Security Media conference 29 May 2018 Why this study? 2 Methodology Methodology of the study Online survey consisting of 33 questions 60 participants from C-Level (CISOs, CIOs, CTOs) 26

More information

Membership

Membership Membership Overview Overview Who We Are PSC Value Engagement Vehicles: Councils & Committees Investment & Benefits Who We Are: Mission PSC s mission is simple and focused: to provide unparalleled value

More information

WELCOME TO THE INNOVATIVE PAYMENTS ASSOCIATION

WELCOME TO THE INNOVATIVE PAYMENTS ASSOCIATION WELCOME TO THE INNOVATIVE PAYMENTS ASSOCIATION Who We Are The Innovative Payments Association ("IPA") is a trade organization that serves as the leading voice of the electronic payments sector, including

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Membership Categories and Benefits

Membership Categories and Benefits Membership Categories and Benefits As a participant in ISASecure, you are working with thought leaders who are taking action to improve our world. ISASecure promotes and certifies robust and secure technology

More information

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest?

encrypted, and that all portable devices (laptops, phones, thumb drives, etc.) be encrypted while in use and while at rest? Data Privacy According to statistics provided by the Data Breach Level Index, hackers and thieves are stealing more than 227,000 personal records per hour as of 2017, generally targeting customer information

More information

The ACFE Law Enforcement and Government Alliance

The ACFE Law Enforcement and Government Alliance What is the ACFE? The Association of Certified Fraud Examiners (ACFE) is the world s largest anti-fraud organization and premier provider of anti-fraud training and education with more than 80,000 members

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90

79th OREGON LEGISLATIVE ASSEMBLY Regular Session. Senate Bill 90 th OREGON LEGISLATIVE ASSEMBLY-- Regular Session Senate Bill 0 Printed pursuant to Senate Interim Rule. by order of the President of the Senate in conformance with presession filing rules, indicating neither

More information

FileMaker Business Alliance. Program Guide

FileMaker Business Alliance. Program Guide FileMaker Business Alliance Program Guide FileMaker Business Alliance Program Guide Get Started... 3 FBA Business Types and Requirements... 4 Partner Levels... 7 FBA Six Pillars of Excellence... 10 Contact

More information

Cybersecurity and Hospitals: A Board Perspective

Cybersecurity and Hospitals: A Board Perspective Cybersecurity and Hospitals: A Board Perspective Cybersecurity is an important issue for both the public and private sector. At a time when so many of our activities depend on information systems and technology,

More information

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN 24-27 July 2016 1 CONTENT INTRODUCTION POLICY OBJECTIVES POLICY AND LEGISLATIVE PRINCIPLES CYBER SECURITY STRATEGY CHALLENGES AND OPPORTUNITIES CAPACITY BUILDING

More information

DFARS Cyber Rule Considerations For Contractors In 2018

DFARS Cyber Rule Considerations For Contractors In 2018 Portfolio Media. Inc. 111 West 19 th Street, 5th Floor New York, NY 10011 www.law360.com Phone: +1 646 783 7100 Fax: +1 646 783 7161 customerservice@law360.com DFARS Cyber Rule Considerations For Contractors

More information

WEB ACCESSIBILITY POLICY

WEB ACCESSIBILITY POLICY WEB ACCESSIBILITY POLICY I. Policy Section 15.0 Information Technology II. Policy Subsection 15.2 Web Accessibility Policy III. Policy Statement Grand Rapids Community College will monitor and promote

More information

Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Could the BIGGEST Threat to Your Business be INSIDE Your Company? Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc. Cheryl W. Snead President/CEO/Facility Security

More information

Preparing for a Breach October 14, 2016

Preparing for a Breach October 14, 2016 Preparing for a Breach October 14, 2016 Jeremy Gilbert, GCFE, GASF, EnCE, CPA Manager, DHG Forensics forensics 1 Agenda Medical data breaches Why? Types? Frequency? Impact of a data breach How to prepare

More information

The Value of Bipartisanship

The Value of Bipartisanship About Vectis Vectis At Vectis Strategies we understand how to successfully and properly apply leverage in public relations, government stretch from the corridors of power in Washington, DC to international

More information

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM

PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM PROTECTING ARIZONA AGAINST CYBER THREATS THE ARIZONA CYBERSECURITY TEAM THE THREAT WE FACE On average, the Department of Administration information officers identify: 200 brute force attempts per day;

More information

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES

CHARTER OUR MISSION OUR OBJECTIVES OUR GUIDING PRINCIPLES OUR MISSION Promote the highest level of safety for the U.S. offshore oil and natural gas industry through effective leadership, communication, teamwork, utilization of disciplined management systems and

More information

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent

SOC Summit June 6, Strengthening Capacity in Cyber Talent sans.org/cybertalent SOC Summit 2017 June 6, 2017 Strengthening Capacity in Cyber Talent sans.org/cybertalent Increasing Sense of Urgency Cyber threats to U.S. national and economic security are increasing in frequency, scale,

More information

Regulation P & GLBA Training

Regulation P & GLBA Training Regulation P & GLBA Training Overview Regulation P governs the treatment of nonpublic personal information about consumers by the financial institution. (Gramm-Leach-Bliley Act of 1999) The GLBA is composed

More information

Standing Together for Financial Industry Resilience Quantum Dawn IV after-action report June 2018

Standing Together for Financial Industry Resilience Quantum Dawn IV after-action report June 2018 Standing Together for Financial Industry Resilience Quantum Dawn IV after-action report June 2018 Contents Background 3 Exercise objectives 4 Day 1 Cyber-range exercise 5 Day 2 Cyberattack scenario 6-7

More information

UNSCR 1540 Compliance From Policy to Implementation

UNSCR 1540 Compliance From Policy to Implementation Maritime Security Council L UNSCR 1540 Compliance From Policy to Implementation Committee on Hemispheric Security February 18, 2010 Talking Points Presentation Objective MSC Overview OAS Imperatives/Goals

More information

Combating Cyber Risk in the Supply Chain

Combating Cyber Risk in the Supply Chain SESSION ID: CIN-W10 Combating Cyber Risk in the Supply Chain Ashok Sankar Senior Director Cyber Strategy Raytheon Websense @ashoksankar Introduction The velocity of data breaches is accelerating at an

More information

Effective Cyber Incident Response in Insurance Companies

Effective Cyber Incident Response in Insurance Companies August 2017 Effective Cyber Incident Response in Insurance Companies An article by Raj K. Chaudhary, CRISC, CGEIT; Troy M. La Huis; and Lucas J. Morris, CISSP Audit / Tax / Advisory / Risk / Performance

More information

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Strengthening Capacity in Cyber Talent sans.org/cybertalent SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus

More information

Compliance with NIST

Compliance with NIST Compliance with NIST 800-171 1 What is NIST? 2 Do I Need to Comply? Agenda 3 What Are the Requirements? 4 How Can I Determine If I Am Compliant? 5 Corserva s NIST Assessments What is NIST? NIST (National

More information

RISK MANAGEMENT Education and Certification

RISK MANAGEMENT Education and Certification RISK MANAGEMENT Education and Certification aba.com/risked 1-800-BANKERS A new type of risk management professional is now in demand one that can demonstrate a thorough understanding of the complexities

More information

Candidate Profile for the Position of Vice President, Education and Certification

Candidate Profile for the Position of Vice President, Education and Certification Candidate Profile for the Position of Vice President, Education and Certification * * * * This profile provides information about the National Automatic Merchandising Association and the position requirements

More information

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC

More information

Cyber Management for Ports Results of Small Port Cyber Security Workshops

Cyber Management for Ports Results of Small Port Cyber Security Workshops AAPA Port Governing Boards Cyber Management for Ports Results of Small Port Cyber Security Workshops MARAD and the CHCP June 2018 1200 New Jersey Ave., SE Washington DC 20590 w w w. d o t. g o v Recent

More information

Section One of the Order: The Cybersecurity of Federal Networks.

Section One of the Order: The Cybersecurity of Federal Networks. Summary and Analysis of the May 11, 2017 Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure. Introduction On May 11, 2017, President Donald

More information

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016

ASSEMBLY, No STATE OF NEW JERSEY. 217th LEGISLATURE INTRODUCED FEBRUARY 4, 2016 ASSEMBLY, No. STATE OF NEW JERSEY th LEGISLATURE INTRODUCED FEBRUARY, 0 Sponsored by: Assemblywoman VALERIE VAINIERI HUTTLE District (Bergen) Assemblyman DANIEL R. BENSON District (Mercer and Middlesex)

More information

Hearing Voices: The Cybersecurity Pro s View of the Profession

Hearing Voices: The Cybersecurity Pro s View of the Profession SESSION ID: AST2-W02 Hearing Voices: The Cybersecurity Pro s View of the Profession Jon Oltsik Senior Principal Analyst and ESG Fellow Enterprise Strategy Group @joltsik Candy Alexander, CISSP CISM International

More information

ROADMAP TO DFARS COMPLIANCE

ROADMAP TO DFARS COMPLIANCE ROADMAP TO DFARS COMPLIANCE ARE YOU READY FOR THE 12/31/17 DEADLINE? In our ebook, we have answered the most common questions we receive from companies preparing for DFARS compliance. Don t risk terminated

More information

The HIPAA Omnibus Rule

The HIPAA Omnibus Rule The HIPAA Omnibus Rule What You Should Know and Do as Enforcement Begins Rebecca Fayed, Associate General Counsel and Privacy Officer Eric Banks, Information Security Officer 3 Biographies Rebecca C. Fayed

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Session 609 Tuesday, October 22, 2:45 PM - 3:45 PM Track: IT Governance and Security

Session 609 Tuesday, October 22, 2:45 PM - 3:45 PM Track: IT Governance and Security Session 609 Tuesday, October 22, 2:45 PM - 3:45 PM Track: IT Governance and Security An Overview of Recent Changes to ISO 20000 Ron Lester Enterprise Service Management Consultant, Information Technology

More information

POSITION DESCRIPTION

POSITION DESCRIPTION POSITION DESCRIPTION Engagement Manager Unit/Branch, Directorate: Location: Outreach & Engagement, Information Assurance and Cyber Security Directorate Auckland Salary range: H $77,711 - $116,567 Purpose

More information

Indonesia Cyber Security Market

Indonesia Cyber Security Market Indonesia Cyber Security Market EXECUTIVE SUMMARY: Indonesia offers abundant demand for cyber security exports. Defense spending is modest, totaling $8 billion, but is expected to increase. Increase in

More information

Business Continuity Management

Business Continuity Management Business Continuity Management Cyber Security importance by Ashraf Hasanov Business Continuity Expert BCMS BS25999 Lead Auditor Regional Disaster Response Team Member of IFRC What could stop your business?

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY

2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY 2016 SC REGIONAL HOUSING AUTHORITY NO. 3 S EIV SECURITY POLICY Purpose: The purpose of this policy is to provide instruction and information to staff, auditors, consultants, contractors and tenants on

More information

Article II - Standards Section V - Continuing Education Requirements

Article II - Standards Section V - Continuing Education Requirements Article II - Standards Section V - Continuing Education Requirements 2.5.1 CONTINUING PROFESSIONAL EDUCATION Internal auditors are responsible for maintaining their knowledge and skills. They should update

More information

Reducing Cybersecurity Costs & Risk through Automation Technologies

Reducing Cybersecurity Costs & Risk through Automation Technologies Reducing Cybersecurity Costs & Risk through Automation Technologies Sponsored by Juniper Networks Independently conducted by Ponemon Institute LLC Publication Date: November 2017 Ponemon Institute Research

More information

Anatomy of a Data Breach: A Practical Guide for Small Law Departments

Anatomy of a Data Breach: A Practical Guide for Small Law Departments Anatomy of a Data Breach: A Practical Guide for Small Law Departments Judy Branzelle is the Chief Legal Officer and General Counsel for Goodwill Industries International, Inc. where she has been employed

More information

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK

THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER INFORMATION PACK GAIN RECOGNITION AS AN APPROVED PROVIDER UNDER ISO/IEC 17024 AND JOIN OUR NETWORK OF TRUSTED PROVIDERS THE TRUSTED NETWORK POWERING GLOBAL SUPPLY CHAINS AND THEIR COMMUNITIES APPROVED EDUCATION PROVIDER

More information

Advanced Concepts & Technologies International, LLC

Advanced Concepts & Technologies International, LLC Advanced Concepts & Technologies International, LLC Advanced Concepts and Technologies International, L.L.C. (ACT I) has been providing solutions for high profile military programs such as the U.S. Navy

More information

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity Understanding Cyber Insurance & Regulatory Drivers for Business Continuity Lily Yeoh, CISSP, CBCP lily@cb1security.com https://www.cb1security.com Agenda BC/DR Business Drivers Recent Regulatory & Cyber

More information

Exert Influence. Combine forces to transform public policy and open new markets, at the state and federal levels

Exert Influence. Combine forces to transform public policy and open new markets, at the state and federal levels Members Join Us To Stay Informed Reduce cost of doing business through relevant tools, actionable information and expert insights Exert Influence Combine forces to transform public policy and open new

More information

Hacking and Cyber Espionage

Hacking and Cyber Espionage Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby

More information

falanx Cyber ISO 27001: How and why your organisation should get certified

falanx Cyber ISO 27001: How and why your organisation should get certified falanx Cyber ISO 27001: How and why your organisation should get certified Contents What is ISO 27001? 3 What does it cover? 3 Why should your organisation get certified? 4 Cost-effective security management

More information

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent

Keeping Your SOCs Full. May 26, Strengthening Capacity in Cyber Talent sans.org/cybertalent Keeping Your SOCs Full May 26, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus on theoretical

More information

UNIVERSITY OF RWANDA VACANCY ANNOUNCEMENT

UNIVERSITY OF RWANDA VACANCY ANNOUNCEMENT UNIVERSITY OF RWANDA VACANCY ANNOUNCEMENT The University of Rwanda informs the public that it would like to recruit qualified administrative staff to fill the following positions: N o Job Title Minimum

More information

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC

PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC PROCEDURE COMPREHENSIVE HEALTH SERVICES, INC APPROVAL AUTHORITY: President, CHSi GARY G. PALMER /s/ OPR: Director, Information Security NUMBER: ISSUED: VERSION: APRIL 2015 2 THOMAS P. DELAINE JR. /s/ 1.0

More information

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards GEORGIA CYBERSECURITY WORKFORCE ACADEMY NASCIO 2018 State IT Recognition Awards Title: Georgia Cybersecurity Workforce Academy Category: Cybersecurity State: Georgia Contact: Stanton Gatewood Stan.Gatewood@gta.ga.gov

More information

POSITION DESCRIPTION

POSITION DESCRIPTION UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:

More information

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE Information Technology Services Administrative Regulation ITS-AR-1506 INFORMATION SECURITY-SECURITY INCIDENT RESPONSE 1.0 Purpose and Scope The purpose of the Security Response Administrative Regulation

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

PROJECT MANAGEMENT PROFESSIONAL (PMP)

PROJECT MANAGEMENT PROFESSIONAL (PMP) PROJECT MANAGEMENT PROFESSIONAL (PMP) EXAM PREPARATION TRAINING WHAT IS PMP? Government, commercial and other organizations employ PMP certified project managers in an attempt to improve the success rate

More information

Thales Cyber Assurance Webinar Your first step to Cyber Security

Thales Cyber Assurance Webinar Your first step to Cyber Security www.thalesgroup.com Thales Cyber Assurance Webinar Your first step to Cyber Security 10 February 2012 Ross Parsell/Edward Wolton 2012 Thales UK Ltd. 2 / Edward Wolton Edward has been working in what is

More information

Information Governance, the Next Evolution of Privacy and Security

Information Governance, the Next Evolution of Privacy and Security Information Governance, the Next Evolution of Privacy and Security Katherine Downing, MA, RHIA, CHPS, PMP Sr. Director AHIMA IG Advisors Follow me @HIPAAQueen 2017 2017 Objectives Part Part I IG Topic

More information

SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION

SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION SAVANNAH LAKES VILLAGE PROPERTY OWNERS ASSOCIATION, INC. JOB DESCRIPTION POSITION: CHIEF OPERATING OFFICER FUNCTION: Responsible for all aspects of the SLV POA day-to-day operations. In this capacity,

More information

Public Power Forward Challenges & Opportunities

Public Power Forward Challenges & Opportunities Public Power Forward Challenges & Opportunities SUE KELLY President & CEO American Public Power Association 2015 ElectriCities of NC Annual Conference August 7, 2015 APPA Members 1400+ public power utilities

More information

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE.

MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. MY CERTIFICATION HELPED ME GET HERE. MY MEMBERSHIP HELPS KEEP ME HERE. TIMO HEIKKINEN, CISA, CGEIT SENIOR AUDIT SPECIALIST, NORDEA HELSINKI, FINLAND ISACA MEMBER SINCE 1999 ABOUT US BE MORE INFORMED, VALUED

More information

Lakeshore Technical College Official Policy

Lakeshore Technical College Official Policy Policy Title Original Adoption Date Policy Number Information Security 05/12/2015 IT-720 Responsible College Division/Department Responsible College Manager Title Information Technology Services Director

More information

A Global Look at IT Audit Best Practices

A Global Look at IT Audit Best Practices A Global Look at IT Audit Best Practices 2015 IT Audit Benchmarking Survey March 2015 Speakers Kevin McCreary is a Senior Manager in Protiviti s IT Risk practice. He has extensive IT audit and regulatory

More information

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m. It is crucial that small financial firms take proper cybersecurity measures to protect their customers and their firm. During

More information

Business Case for Training and Certification

Business Case for Training and Certification Business Case for Training and Certification Jim Shea, CEO, CDI Online LMS Services www.iaop.org What is Professional Certification and who is providing it? Definition of Professional Certification Professional

More information

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec.

National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec. National Initiative for Cyber Education (NICE) and the Cybersecurity Workforce Framework: Attract and Retain the Best in InfoSec April 12, 2018 1 Introduction to NICE - The National Initiative for Cybersecurity

More information

Cybersecurity Fundamentals

Cybersecurity Fundamentals Cybersecurity Fundamentals Prof. Georges Ataya, Vice President of the Belgian Cybersecurity Coalition Academic Director, IT Management Education (Solvay Brussels School of Economics and Management) Managing

More information

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors

MANUAL OF UNIVERSITY POLICIES PROCEDURES AND GUIDELINES. Applies to: faculty staff students student employees visitors contractors Page 1 of 6 Applies to: faculty staff students student employees visitors contractors Effective Date of This Revision: June 1, 2018 Contact for More Information: HIPAA Privacy Officer Board Policy Administrative

More information

Cybersecurity in Higher Ed

Cybersecurity in Higher Ed Cybersecurity in Higher Ed 1 Overview Universities are a treasure trove of information. With cyber threats constantly changing, there is a need to be vigilant in protecting information related to students,

More information

Managing the Cybersecurity Threat

Managing the Cybersecurity Threat Managing the Cybersecurity Threat State of the Art Trade Secrets Protection Strategies Washington, DC Nov. 15, 2011 David Z. Bodenheimer Partner Crowell & Moring LLP 2011 Crowell & Moring LLP Cyber Spies

More information

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS Good IT governance is a key element of a well-performing enterprise. Enterprises need qualified information

More information

October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS

October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS October 21 22, 2014 Introduction to CompTIA, Communities, and ITSS CompTIA Big View CompTIA Member Communities IT Services & Support Who is CompTIA? Global, Not for Profit, IT Industry Trade Association

More information

Putting It All Together:

Putting It All Together: Putting It All Together: The Interplay of Privacy & Security Regina Verde, MS, MBA, CHC Chief Corporate Compliance & Privacy Officer University of Virginia Health System 2017 ISPRO Conference October 24,

More information

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017

HIPAA in 2017: Hot Topics You Can t Ignore. Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017 HIPAA in 2017: Hot Topics You Can t Ignore Danika Brinda, PhD, RHIA, CHPS, HCISPP March 16, 2017 Breach Notification State Law Privacy Rule Authorizations Polices and Procedures The Truth Is Have created

More information

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER

AMERICAN CHAMBER OF COMMERCE IN THAILAND DIGITAL ECONOMY POSITION PAPER AMCHAM Background AMCHAM Thailand was formed in 1956 with a membership of 8 American companies and 60 American nationals. Today, AMCHAM has over 650 members, comprising 2,000 executives and professionals.

More information

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011

SECURITY CODE. Responsible Care. American Chemistry Council. 7 April 2011 American Chemistry Council Responsible Care SECURITY CODE 7 April 2011 Debra Phillips Managing Director, Responsible Care American Chemistry Council Why develop a Separate Security Code? Need for a clearly

More information