MasterCard 2011 Payment Card Security Summit Johannesburg, South Africa February 15-18, 2011 INNOVATE. COLLABORATE. EDUCATE.

Size: px
Start display at page:

Download "MasterCard 2011 Payment Card Security Summit Johannesburg, South Africa February 15-18, 2011 INNOVATE. COLLABORATE. EDUCATE."

Transcription

1 MasterCard 2011 Payment Card Security Summit Johannesburg, South Africa February 15-18, 2011 INNOVATE. COLLABORATE. EDUCATE. Tuesday February 15, 2011 Registration & Welcome Coffee 08:00 09:00 General Session: 09:00 17:00 Opening Address and Welcome Remarks 09:00 09:20 The Evolving Fraud Landscape: A customer panel analyzing fraud trend and successful mitigation strategies 09:20 10:10 Panelists: Gavin Wasserfall (ABSA), FNB, Ian Potgieter (MasterCard Dubai) Moderated by: Barry Wong, Senior Business Leader, MasterCard Worldwide This panel of diverse customer representatives will discuss the challenges that they are facing in their respective markets of SAMEA. Find out about the trends they are seeing and the best practices their companies have put in place that have resulted in success stories. Hear about how they are managing their portfolios and the inherent issues that go along with their jurisdictions Data Protection How it can be Compromised Dr C.P. (Buks) Louwrens, Nedbank 10:10 10:50 Brief discussion of how a combination of old tricks and new digital forensic cryptographic technologies make it possible to overcome some traditional data protection measures. Some of these techniques will be practically demonstrated. Coffee Break / Exhibitor Introductions / Networking 10:50 11:20 The Growing Threats in the Global Marketplace John Yeo, Trustwave 11:20-12:00 The 2011 Trustwave Global Security Report correlates data from hundreds of compromise investigations and thousands of penetration tests conducted in more than 40 countries in This year s edition offers a unique analysis of the world's information security weakness and defence capabilities, including the newest threats businesses will face in The report also analyses the shift in attack vectors over the past 30 years from physical threats in the 1980s to those arising from mobile computing and social networking in AGENDA 1

2 A Recipe for Staying Out of the Headlines: An Investigator's Perspective Into the Current Cyber Crime Landscape Andrew Bonillo, Principal, Investigative Response, Verizon Business Bryan Sartin, Director of Investigative Response, Verizon Business 12:00 13:00 The information security threats we face are a constantly changing landscape. Delivered by representatives from the Verizon Business Investigative Response Team, this presentation will cover the most recent evolutions in cyber crime with a particular emphasis on the compromise of cardholder data. The discussion will center around risk-driven metrics and statistics taken from real world computer forensic investigations and will cover victim company demographics, data breach sources by region and attack vector, intrusion entry points, organized crime involvement, attack leading indicators, key risk mitigators based on experience, among others. Lunch / Exhibitors / Networking 13:00 14:00 Effective Communication Strategies around Fraud and ADC Events Chris Harrall, Senior Business Leader, MasterCard Worldwide 14:00 14:30 This session will provide an overview on the end-to-end approach on ADC including the role and responsibility that each stakeholder plays on the issues related to ADC Event Management, Crisis Communications and Regulatory Focus. POI Manipulations Risk Diversion Peter Fryer, Director Operations, Risk Diversion (Pty) Ltd. 14:30 15:15 Peter will share examples and were possible demonstrate POI manipulation. In addition to this we will share best practices in order to avoid becoming a target. Coffee Break / Exhibitors / Networking 15:15-15:40 How to Succeed at Achieving PCI John Verdeschi, Senior Business Leader, MasterCard Worldwide 15:40 16:20 Becoming and maintaining PCI compliance can seem daunting. This presentation will highlight common misunderstandings and misinterpretations made regarding PCI and a strategy to achieve on-going compliance. It will also include an update on the PCI Security Standards Council s standards lifecycle; learn about the new updates for the 2010 release of the DSS, PA-DSS, PTS; and the emerging technology framework. A Customer s Perspective on Achieving PCI Compliance Cowyk Fox, Chief Operating Officer: ABSA Card; Wenlock Free, VP Business Development, SecurityMetrics, Bryan Sartin, Director of Investigative Response, Verizon Business 16:20 17:00 First hand view from a banking institution discussing their experiences while becoming PCI compliant. Cocktail Reception Event (Co-Sponsored by Norkom) 18:00 19:00 Dinner (Co-Sponsored by Trustwave) 19:00 21:00 AGENDA 2

3 Wednesday February 16, 2011 Managing Payment Card Fraud - Effective Legislation Advocate Jan Henning, Deputy Chairperson of the Financial Services Board Enforcement Committee, S. Africa 9:00 9:40 Making use of Local Legislation in order to prosecute and receive effective jail terms for Credit Card fraud. Managing Key Processes and Best Practices to Curtail the Impact of Fraud Tim Buckingham, Litigation Partner, DLA Piper UK LLP 9:40 10:30 The first weeks after a fraud has been detected can be pivotal in recovering money or minimizing losses. Using actual examples, this session will look at common issues arising out of fraud, and some best practices to develop to assist in investigating the fraud, and minimizing the impact of fraudulent activity. Learn about the significance of proper document management, the appropriate third party communications, techniques to interview a suspected fraudster and working with the authorities on cross border fraud to determine how and when to look at civil remedies. The Data-Driven Fraud Fight: Putting Analytics and Performance Metrics to Work for You Christine Brundage, Global Solutions Leader, MasterCard Advisors Leveraging data in the form of fraud lifecycle performance metrics and analytic outcomes allows organizations to gain a deeper understanding of their business. This session will explore how to use this information to make smarter decisions and gain new insights, from prevention and detection to recovery. 10:30 11:00 Coffee Break / Exhibitors / Networking 11:00-11:20 The Changing Face of Payments Gary Byrne, Region Lead for Product Support & Deployment MasterCard Worldwide 11:20 12:00 Attendees will learn how their CHIP investment can be leveraged through new secure payment applications, including Mobile Commerce and Paypass solutions. Discussion on the latest Trends in Card Payments: Evolutionary Products and Technologies (Contactless, NFC, Chip, Mobile, Display Card, etc.) Aggressive Marketing Practices: Identifying Areas of Increased Scrutiny in the Payment System Bob Caldwell, Partner, G2 Web Services, LLC 12:00 12:45 This session will provide you with a comprehensive overview of the areas of scrutiny for some ecommerce merchant practices. Understand the types of vulnerabilities in business practices and potential areas of increased scrutiny. Identify trends and return to your company with increased understanding of the types of inquiries that should be a part of enhanced due diligence. Lunch / Exhibitors / Networking 12:45 13:45 Understanding Your Fraud Business to Better Partner with Out-source Vendors Christine Brundage, Global Solutions Leader, MasterCard Worldwide 13:45 14:25 In today's market, many issuers choose to partner with third-party vendors to manage their fraud program. This partnership takes many forms, but in all forms, one thing is certain - you must understand all aspects of your fraud business to gain the most benefit from this arrangement. In this session, learn how issuers can gain new insights and use this information to optimize the relationship with their vendors. AGENDA 3

4 Effective Fraud Reduction Strategies Through Better Analytics and Real-Time Scoring John Verdeschi, Senior Business Leader, MasterCard Worldwide 14:25 15:10 Fraud is constantly evolving and can occur on both compromised and non-compromised accounts. Issuers face a significant challenge in monitoring transactions for fraud and make spilt-second decisions on authorizing or declining transactions, closing accounts, and possibly reissuing accounts. To do so effectively, issuers need to be confident in their decision making capabilities and require an objective viewpoint on fraud prediction. In this session, participants will learn about the MasterCard Expert Monitoring Solution and Compromised Account Service, and hear about how these technologies can generate tremendous results in the war on fraud. Coffee Break / Exhibitors 15:10-15:30 Update on MasterCard Compliance Programs Paul Paolucci, Business Leader, MasterCard Worldwide 15:30 16:30 Card Security & ARM Products Update Ravi Aurora, Senior Business Leader, MasterCard Worldwide 16:30 17:00 Closing Remarks: End of Security Summit 17:00 17:15 Thursday February 17, 2011 PCI: Lessons to be Learned from Data Breaches Joshua Knopp, Business Leader, MasterCard Worldwide Examine case studies based on real world forensic investigations that will help you learn to recognize the warning signs that present themselves prior to an account data compromise. Review the detection and prevention practices that your organization can implement to prevent a potentially damaging breach from occurring. See Agenda below: 9:00 17:00 PCI Training Agenda Welcome & Introductions Security Landscape and Account Data Compromise Trends Updates on the PCI Security standards Council Coffee Break Overview of the PCI Data Security Standards Lunch Case Study Approach to Implementing PCI Requirements: Small & Medium Merchant Case Studies Coffee Break Case Study Approach to Implementing PCI Requirements: Medium Merchant and Large Processor Case Studies AGENDA 4

5 Friday February 18, 2011 (Location: MasterCard Office: 16 Floor, Sandton City Office Tower Cnr Rivonia Rd and 5th Street, Sandton :00 15:00 E-Commerce Merchant Boarding and Monitoring Procedures (With specific focus on High Risk Merchant categories) Bob Caldwell, Partner, G2 Web Services, LLC Paul Paolucci, Business Leader, MasterCard Worldwide 9:00 17:00 This interactive session will allow you to get your questions answered on how to best identify and manage your risk mitigation associated with MasterCard Rules and to employ best practices in early warning and detection of potential and current industry schemes. Hear directly from MasterCard Fraud Detection and Review business leader and the industry experts in risk monitoring, G2 Web Services, to best understand the MasterCard compliance programs, including registration, reporting requirements, monitoring and detection. Return to your company with a better sense of MasterCard s approach to protecting the payments network and steps to improve your own compliance. As an attendee, you will: Gain a comprehensive understanding of the MasterCard Compliance Programs that can help you optimize operations and reduce remediation time Be the first to hear about the new programs and enhancements that are in development to streamline the compliance process for MasterCard customers Network with peers, share ideas and make suggestions around improving program monitoring and execution Learn how to minimize the risks associated with compliance and how to better protect your business reputation and potentially reduce non-compliance events. Examine case studies based on real world forensic investigations that will help you learn to recognize the warning signs that present themselves prior to an account data compromise. Review the detection and prevention practices that your organization can implement to prevent a potentially damaging breach from occurring. AGENDA 5

INNOVATE. COLLABORATE. EDUCATE.

INNOVATE. COLLABORATE. EDUCATE. Global Risk Management Conference Middle East & Africa March 11-14, 2013 Cape Town, South Africa AGENDA Please visit our website for updates on our programs (www.mastercard.com/arm) Monday March 11, 2013

More information

Facing Up to the Challenges

Facing Up to the Challenges Information Security, Data Breaches and Protecting Cardholder Information: Facing Up to the Challenges SEPTEMBER 13-14, 2006 Account Number PIN Number Social Security Number Social Security Number Information

More information

Mastercard Global Risk Leadership Conference DRAFT- AGENDA Albufeira, Portugal September 25-28, 2017

Mastercard Global Risk Leadership Conference DRAFT- AGENDA Albufeira, Portugal September 25-28, 2017 Monday, September 25, 2017- Risk Leadership Conference Pre-Conference Sessions Early Registration Pre-Conference Workshop: PCI and Beyond: 3DS2.0, PIN Entry on mpos and more Venue: São Miguel Pre-Conference

More information

Cybersecurity and the Board of Directors

Cybersecurity and the Board of Directors Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education

More information

PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing

PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing 1 WhiteHat Security Application Security Company Leader in the Gartner Magic Quadrant Headquartered in Santa Clara, CA 320+

More information

Experience Security, Risk, and Governance

Experience Security, Risk, and Governance Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation

More information

Sage Data Security Services Directory

Sage Data Security Services Directory Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time

More information

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant

More information

Maintaining Trust: Visa Inc. Payment Security Strategy

Maintaining Trust: Visa Inc. Payment Security Strategy Maintaining Trust: Visa Inc Payment Security Strategy Ellen Richey 2010 Payments Conference Chicago Federal Reserve Global Electronic Payments Protecting the payment system is a shared responsibility among

More information

Leading the Digital Transformation from the Centre of Government

Leading the Digital Transformation from the Centre of Government 37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00

More information

CyberEdge. End-to-End Cyber Risk Management Solutions

CyberEdge. End-to-End Cyber Risk Management Solutions CyberEdge End-to-End Cyber Risk Management Solutions In a rapidly changing landscape, CyberEdge provides clients with an end-to-end risk management solution to stay ahead of the curve of cyber risk. CyberEdge

More information

SWIFT Customer Security Programme

SWIFT Customer Security Programme www.pwc.ch/cybersecurity SWIFT Customer Security Programme Mandatory controls: what you have to do to protect your local SWIFT infrastructures SWIFT Customer Security Programme (CSP) The growing number

More information

Evolution of Cyber Attacks

Evolution of Cyber Attacks Update from the PCI Security Standards Council Troy Leach, CTO, PCI Security Standards Council Evolution of Cyber Attacks Viruses Worms Trojan Horses Custom Malware Advanced Persistent Threats 1 Modern

More information

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.

STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions. Intelligence-driven security STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions. BETTER INTELLIGENCE. BETTER DEFENSE. The

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

Site Data Protection (SDP) Program Update

Site Data Protection (SDP) Program Update Advanced Payments October 9, 2006 Site Data Protection (SDP) Program Update Agenda Security Landscape PCI Security Standards Council SDP Program October 9, 2006 SDP Program Update 2 Security Landscape

More information

Will you be PCI DSS Compliant by September 2010?

Will you be PCI DSS Compliant by September 2010? Will you be PCI DSS Compliant by September 2010? Michael D Sa, Visa Canada Presentation to OWASP Toronto Chapter Toronto, ON 19 August 2009 Security Environment As PCI DSS compliance rates rise, new compromise

More information

An ICS Whitepaper Choosing the Right Security Assessment

An ICS Whitepaper Choosing the Right Security Assessment Security Assessment Navigating the various types of Security Assessments and selecting an IT security service provider can be a daunting task; however, it does not have to be. Understanding the available

More information

PCI DSS Compliance and the Cloud

PCI DSS Compliance and the Cloud PCI DSS Compliance and the Cloud Daniel Farr, Managing Consultant CyberSecurity Consulting PCI & Compliance Services DF&IR Risk Reduction Solutions www.foregenix.com A Brief History of Foregenix Foregenix

More information

Navigating the PCI DSS Challenge. 29 April 2011

Navigating the PCI DSS Challenge. 29 April 2011 Navigating the PCI DSS Challenge 29 April 2011 Agenda 1. Overview of Threat and Compliance Landscape 2. Introduction to the PCI Security Standards 3. Payment Brand Compliance Programs 4. PCI DSS Scope

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

Background FAST FACTS

Background FAST FACTS Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance

More information

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by

More information

Choosing the Right Security Assessment

Choosing the Right Security Assessment A Red Team Whitepaper Choosing the Right Security Navigating the various types of Security s and selecting an IT security service provider can be a daunting task; however, it does not have to be. Understanding

More information

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress

More information

June 2012 First Data PCI RAPID COMPLY SM Solution

June 2012 First Data PCI RAPID COMPLY SM Solution June 2012 First Data PCI RAPID COMPLY SM Solution You don t have to be a security expert to be compliant. Developer: 06 Rev: 05/03/2012 V: 1.0 Agenda Research Background Product Overview Steps to becoming

More information

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic

More information

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au

Your guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au Your guide to the Payment Card Industry Data Security Standard (PCI DSS) 1 13 13 76 banksa.com.au CONTENTS Page Contents 1 Introduction 2 What are the 12 key requirements of PCIDSS? 3 Protect your business

More information

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION

Dynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION 9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.

More information

Texas Department of Banking United States Secret Service January 25, 2012

Texas Department of Banking United States Secret Service January 25, 2012 Texas Department of Banking United States Secret Service January 25, 2012 Presented by: Texas Department of Banking Banking Commissioner Charles G. Cooper Deputy Commissioner Bob Bacon Chief IT Security

More information

The University of Queensland

The University of Queensland UQ Cyber Security Strategy 2017-2020 NAME: UQ Cyber Security Strategy DATE: 21/07/2017 RELEASE:0.2 Final AUTHOR: OWNER: CLIENT: Marc Blum Chief Information Officer Strategic Information Technology Council

More information

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,

More information

Risk Advisory Academy Training Brochure

Risk Advisory Academy Training Brochure Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty

More information

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient? Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY

More information

Cipherithm LLC 2013 PCI SSC North America Community Meeting Notes

Cipherithm LLC 2013 PCI SSC North America Community Meeting Notes Cipherithm LLC 2013 PCI SSC North America Community Meeting Notes A Cipherithm White Paper Document Version 1.00 Publish date: Sept 30, 2013 DISCLAIMER This publication is proprietary and confidential

More information

Measuring Cyber Risk Understanding the Right Data Sources. Sponsored By:

Measuring Cyber Risk Understanding the Right Data Sources. Sponsored By: Measuring Cyber Risk Understanding the Right Data Sources Sponsored By: Measuring Cyber Risk Understanding the Right Data Sources Visit www.advisenltd.com at the end of this webinar to download: Copy of

More information

Endpoint Security for Wholesale Payments

Endpoint Security for Wholesale Payments Endpoint Security for Wholesale Payments 2018 CHICAGO PAYMENTS SYMPOSIUM EMILY CARON MANAGER, FMI RISK & POLICY FEDERAL RESERVE BOARD The views expressed in this presentation are those of the speaker and

More information

TOP RISK CONCERNS MERCHANT DATA BREACHES. Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions

TOP RISK CONCERNS MERCHANT DATA BREACHES. Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions TOP RISK CONCERNS MERCHANT DATA BREACHES Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions Today s Webinar Will Cover: Current state of merchant data breaches Impact of merchant data

More information

PROVIDING INVESTIGATIVE SOLUTIONS

PROVIDING INVESTIGATIVE SOLUTIONS PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely

More information

Application Security at Scale

Application Security at Scale Jake Marcinko Standards Manager, PCI Security Standards Council Jeff Williams CTO, Contrast Security Application Security at Scale AppSec at Scale Delivering Timely Security Solutions / Services to Meet

More information

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank

Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.

More information

Managing Risk in the Digital World. Jose A. Rodriguez, Director Visa Consulting and Analytics

Managing Risk in the Digital World. Jose A. Rodriguez, Director Visa Consulting and Analytics Managing Risk in the Digital World Jose A. Rodriguez, Director Visa Consulting and Analytics What is driving the security landscape? Innovation New entrants New technologies New business models Data Compromises

More information

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being

More information

International Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE

International Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE PROTECT 2019 International Exhibition and Conference on Security & Safety March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE WHAT IS PROTECT? The only government-private sector

More information

InfoSec Risks from the Front Lines

InfoSec Risks from the Front Lines InfoSec Risks from the Front Lines Adam Brand, Protiviti Orange County IIA Seminar Who I Am Adam Brand IT Security Services Some Incident Response Experience Lead Breach Detection Audits @adamrbrand Who

More information

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on

More information

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18 Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are

More information

Symantec Security Monitoring Services

Symantec Security Monitoring Services 24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts

More information

Annual Financial Services Cyber Security Summit

Annual Financial Services Cyber Security Summit rd 3 Annual Financial Services Cyber Security Summit Wednesday 13th July 2016 Peter Oakes, Fintech Ireland / Fintech UK 1 Peter Oakes Executive and non-executive director and advisory committee member

More information

Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches

Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches Chris Bucolo, PCIP, MBA Today s Speaker Chris Bucolo Sr. Manager, Sikich

More information

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services

The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services Major Trends of 2014 And relevant changes in Threat Scenario Most Target Countries and Sectors

More information

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill

More information

EXPLORE the intersection between business continuity and emergency management and corporate/organizational security.

EXPLORE the intersection between business continuity and emergency management and corporate/organizational security. THE COUNCIL ON EMERGENCY MANAGEMENT Business Continuity October 4 th and 5 th, 2017 Halifax Agenda Accommodation: Four Points by Sheraton 1496 Hollis St. 902-423-4444 Meeting Location Meeting Objectives:

More information

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,

More information

Incident Response Services

Incident Response Services Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

All the Latest Data Security News. Best Practices and Compliance Information From the PCI Council

All the Latest Data Security News. Best Practices and Compliance Information From the PCI Council All the Latest Data Security News Best Practices and Compliance Information From the PCI Council 1 What is the PCI Security Standards Council? Collaboration Education Simplified solutions for merchants

More information

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN

CENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Cyber Security and Cyber Fraud

Cyber Security and Cyber Fraud Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa

More information

Security. Made Smarter.

Security. Made Smarter. Security. Made Smarter. Your job is to keep your organization safe from cyberattacks. To do so, your team has to review a monumental amount of data that is growing exponentially by the minute. Your team

More information

Webinar: How to keep your hotel guest data secure

Webinar: How to keep your hotel guest data secure Webinar: How to keep your hotel guest data secure Securing your hotel guest data Wednesday April 18, 2018 2:00 pm ET WEBINAR HOST Joshua Molina Ed Vasko Chief Executive Officer QUESTIONS? Type them in

More information

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary

More information

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition

Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition VIENNA CYBER SECURITY WEEK 2018 Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition SECURITY & DIPLOMACY 29-30 January 15A Favoritenstraße, 1040 Taubstummengasse

More information

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30

OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.

More information

PCI DATA SECURITY STANDARDS VERSION 3.2. What's Next?

PCI DATA SECURITY STANDARDS VERSION 3.2. What's Next? PCI DATA SECURITY STANDARDS VERSION 3.2 What's Next? Presenters Alan Gutierrez Arana Director National PCI Leader RSM US LLP Gus Orologas, QSA Manager RSM US LLP Travis Wendling, QSA Supervisor RSM US

More information

Cyber Security Incident Response Fighting Fire with Fire

Cyber Security Incident Response Fighting Fire with Fire Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the

More information

Securing intelligent networks: a guide for CISO and CIOs

Securing intelligent networks: a guide for CISO and CIOs Securing intelligent networks: a guide for CISO and CIOs 2 Securing intelligent networks: a guide for CISO and CIOs 3 93% say security is a must have or should have for customers of SD-WAN technology;

More information

Dell helps you simplify IT

Dell helps you simplify IT Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending

More information

MASTERCARD EUROPE RISK LEADERSHIP CONFERENCE DRAFT- Split, Croatia

MASTERCARD EUROPE RISK LEADERSHIP CONFERENCE DRAFT- Split, Croatia Monday, September 26, 2016 - Pre-Conference Sessions Pre-Conference Sessions Early Conference Registration and Registration for Pre-Conference Sessions Pre-Conference Workshop Lunch Don t Feel Compromised:

More information

What It Takes to be a CISO in 2017

What It Takes to be a CISO in 2017 What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge

More information

Escaping PCI purgatory.

Escaping PCI purgatory. Security April 2008 Escaping PCI purgatory. Compliance roadblocks and stories of real-world successes Page 2 Contents 2 Executive summary 2 Navigating the road to PCI DSS compliance 3 Getting unstuck 6

More information

Canada Life Cyber Security Statement 2018

Canada Life Cyber Security Statement 2018 Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability

More information

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016

More information

Public Sector Cyber Security Series

Public Sector Cyber Security Series 2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September

More information

in collaboration with

in collaboration with in collaboration with Table of Contents 01 Turn Silos of Data into Operational Intelligence page 04 02 Gain a Competitive Advantage with Cisco and Splunk page 06 03 Improve Insight with IT Operations Analytics

More information

SECURITY SERVICES SECURITY

SECURITY SERVICES SECURITY SECURITY SERVICES SECURITY SOLUTION SUMMARY Computacenter helps organisations safeguard data, simplify compliance and enable users with holistic security solutions With users, data and devices dispersed

More information

Mobile Security / Mobile Payments

Mobile Security / Mobile Payments Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY

More information

CYBER RESILIENCE & INCIDENT RESPONSE

CYBER RESILIENCE & INCIDENT RESPONSE CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable

More information

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016

Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016 Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception

More information

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

10 Cybersecurity Questions for Bank CEOs and the Board of Directors 4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors

More information

SUMMIT ON CYBERSECURITY IN CIVIL AVIATION EUROPE, MIDDLE EAST AND AFRICA (EMEA)

SUMMIT ON CYBERSECURITY IN CIVIL AVIATION EUROPE, MIDDLE EAST AND AFRICA (EMEA) DRAFT Hosted by: TENTATIVE PROGRAMME SUMMIT ON CYBERSECURITY IN CIVIL AVIATION EUROPE, MIDDLE EAST AND AFRICA (EMEA) Bucharest, Romania 7 to 9 May 2018 as of 19 March 2018 OPENING SESSION Welcome remarks

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business

More information

Achieving Java Application Security With Parasoft Jtest

Achieving Java Application Security With Parasoft Jtest Achieving Java Application Security With Parasoft Jtest Cloud computing continues to gain traction as enterprises increasingly embrace the shift to Internet-based environments. Unfortunately, this also

More information

Cybersecurity Session IIA Conference 2018

Cybersecurity Session IIA Conference 2018 www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that

More information

Fraud Risks Facing Credit Unions. ALLIED SOLUTIONS LLC SERVICE CENTER 210 East Main Street, Suite 200, Niles, MI Fax:

Fraud Risks Facing Credit Unions. ALLIED SOLUTIONS LLC SERVICE CENTER 210 East Main Street, Suite 200, Niles, MI Fax: Fraud Risks Facing Credit Unions Today s Session Global risks Share how the bad guys are getting in Focus on Cyber and Card Risk Discuss what the credit union can do to prevent the risk Open discussion

More information

PCI DSS Compliance for Healthcare

PCI DSS Compliance for Healthcare PCI DSS Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches

More information

The Future of PCI: Securing payments in a changing world

The Future of PCI: Securing payments in a changing world The Future of PCI: Securing payments in a changing world Lauren Holloway 2014 Nature of the Threat About the Council PCI DSS Updates Staying Secure How You Can Participate In Closing Agenda Nature of the

More information

Hacking and Cyber Espionage

Hacking and Cyber Espionage Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge

More information

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City 1 Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City The opinions expressed are those of the presenters and are not those of the Federal Reserve Banks, the

More information

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager

IT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager IT Audit and Risk Trends for Credit Union Internal Auditors Blair Bautista, Director Bob Grill, Manager David Dyk, Manager 1 AGENDA Internet Banking Authentication ATM Security and PIN Compliance Social

More information

MASTERCARD EUROPE RISK LEADERSHIP CONFERENCE DRAFT- Split, Croatia

MASTERCARD EUROPE RISK LEADERSHIP CONFERENCE DRAFT- Split, Croatia Monday, September 26, 2016 - Pre-Conference Sessions Pre-Conference Sessions Early Conference Registration and Registration for Pre-Conference Sessions Pre-Conference Workshop Lunch Don t Feel Compromised:

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

Introduction to the PCI DSS: What Merchants Need to Know

Introduction to the PCI DSS: What Merchants Need to Know Introduction to the PCI DSS: What Merchants Need to Know Successfully managing a business in today s environment is, in its own right, a challenging feat. Uncertain economics, increasing regulatory pressures,

More information

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!

More information

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands

Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress

More information

Defensible and Beyond

Defensible and Beyond TELUS Defensible and Beyond Mike Vamvakaris Director and Head of Cyber Security Consulting November 2017 Digital transformation brings many benefits Communication and Collaboration Autonomous and Artificial

More information

Minimizing the PCI Footprint: Reduce Risk and Simplify Compliance

Minimizing the PCI Footprint: Reduce Risk and Simplify Compliance SESSION ID: GRC-F02 Minimizing the PCI Footprint: Reduce Risk and Simplify Compliance Troy Leach CTO PCI Security Standards Council Agenda Today s Landscape Reducing the Card Holder Data Footprint How

More information

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches

More information