MasterCard 2011 Payment Card Security Summit Johannesburg, South Africa February 15-18, 2011 INNOVATE. COLLABORATE. EDUCATE.
|
|
- Ferdinand Evans
- 5 years ago
- Views:
Transcription
1 MasterCard 2011 Payment Card Security Summit Johannesburg, South Africa February 15-18, 2011 INNOVATE. COLLABORATE. EDUCATE. Tuesday February 15, 2011 Registration & Welcome Coffee 08:00 09:00 General Session: 09:00 17:00 Opening Address and Welcome Remarks 09:00 09:20 The Evolving Fraud Landscape: A customer panel analyzing fraud trend and successful mitigation strategies 09:20 10:10 Panelists: Gavin Wasserfall (ABSA), FNB, Ian Potgieter (MasterCard Dubai) Moderated by: Barry Wong, Senior Business Leader, MasterCard Worldwide This panel of diverse customer representatives will discuss the challenges that they are facing in their respective markets of SAMEA. Find out about the trends they are seeing and the best practices their companies have put in place that have resulted in success stories. Hear about how they are managing their portfolios and the inherent issues that go along with their jurisdictions Data Protection How it can be Compromised Dr C.P. (Buks) Louwrens, Nedbank 10:10 10:50 Brief discussion of how a combination of old tricks and new digital forensic cryptographic technologies make it possible to overcome some traditional data protection measures. Some of these techniques will be practically demonstrated. Coffee Break / Exhibitor Introductions / Networking 10:50 11:20 The Growing Threats in the Global Marketplace John Yeo, Trustwave 11:20-12:00 The 2011 Trustwave Global Security Report correlates data from hundreds of compromise investigations and thousands of penetration tests conducted in more than 40 countries in This year s edition offers a unique analysis of the world's information security weakness and defence capabilities, including the newest threats businesses will face in The report also analyses the shift in attack vectors over the past 30 years from physical threats in the 1980s to those arising from mobile computing and social networking in AGENDA 1
2 A Recipe for Staying Out of the Headlines: An Investigator's Perspective Into the Current Cyber Crime Landscape Andrew Bonillo, Principal, Investigative Response, Verizon Business Bryan Sartin, Director of Investigative Response, Verizon Business 12:00 13:00 The information security threats we face are a constantly changing landscape. Delivered by representatives from the Verizon Business Investigative Response Team, this presentation will cover the most recent evolutions in cyber crime with a particular emphasis on the compromise of cardholder data. The discussion will center around risk-driven metrics and statistics taken from real world computer forensic investigations and will cover victim company demographics, data breach sources by region and attack vector, intrusion entry points, organized crime involvement, attack leading indicators, key risk mitigators based on experience, among others. Lunch / Exhibitors / Networking 13:00 14:00 Effective Communication Strategies around Fraud and ADC Events Chris Harrall, Senior Business Leader, MasterCard Worldwide 14:00 14:30 This session will provide an overview on the end-to-end approach on ADC including the role and responsibility that each stakeholder plays on the issues related to ADC Event Management, Crisis Communications and Regulatory Focus. POI Manipulations Risk Diversion Peter Fryer, Director Operations, Risk Diversion (Pty) Ltd. 14:30 15:15 Peter will share examples and were possible demonstrate POI manipulation. In addition to this we will share best practices in order to avoid becoming a target. Coffee Break / Exhibitors / Networking 15:15-15:40 How to Succeed at Achieving PCI John Verdeschi, Senior Business Leader, MasterCard Worldwide 15:40 16:20 Becoming and maintaining PCI compliance can seem daunting. This presentation will highlight common misunderstandings and misinterpretations made regarding PCI and a strategy to achieve on-going compliance. It will also include an update on the PCI Security Standards Council s standards lifecycle; learn about the new updates for the 2010 release of the DSS, PA-DSS, PTS; and the emerging technology framework. A Customer s Perspective on Achieving PCI Compliance Cowyk Fox, Chief Operating Officer: ABSA Card; Wenlock Free, VP Business Development, SecurityMetrics, Bryan Sartin, Director of Investigative Response, Verizon Business 16:20 17:00 First hand view from a banking institution discussing their experiences while becoming PCI compliant. Cocktail Reception Event (Co-Sponsored by Norkom) 18:00 19:00 Dinner (Co-Sponsored by Trustwave) 19:00 21:00 AGENDA 2
3 Wednesday February 16, 2011 Managing Payment Card Fraud - Effective Legislation Advocate Jan Henning, Deputy Chairperson of the Financial Services Board Enforcement Committee, S. Africa 9:00 9:40 Making use of Local Legislation in order to prosecute and receive effective jail terms for Credit Card fraud. Managing Key Processes and Best Practices to Curtail the Impact of Fraud Tim Buckingham, Litigation Partner, DLA Piper UK LLP 9:40 10:30 The first weeks after a fraud has been detected can be pivotal in recovering money or minimizing losses. Using actual examples, this session will look at common issues arising out of fraud, and some best practices to develop to assist in investigating the fraud, and minimizing the impact of fraudulent activity. Learn about the significance of proper document management, the appropriate third party communications, techniques to interview a suspected fraudster and working with the authorities on cross border fraud to determine how and when to look at civil remedies. The Data-Driven Fraud Fight: Putting Analytics and Performance Metrics to Work for You Christine Brundage, Global Solutions Leader, MasterCard Advisors Leveraging data in the form of fraud lifecycle performance metrics and analytic outcomes allows organizations to gain a deeper understanding of their business. This session will explore how to use this information to make smarter decisions and gain new insights, from prevention and detection to recovery. 10:30 11:00 Coffee Break / Exhibitors / Networking 11:00-11:20 The Changing Face of Payments Gary Byrne, Region Lead for Product Support & Deployment MasterCard Worldwide 11:20 12:00 Attendees will learn how their CHIP investment can be leveraged through new secure payment applications, including Mobile Commerce and Paypass solutions. Discussion on the latest Trends in Card Payments: Evolutionary Products and Technologies (Contactless, NFC, Chip, Mobile, Display Card, etc.) Aggressive Marketing Practices: Identifying Areas of Increased Scrutiny in the Payment System Bob Caldwell, Partner, G2 Web Services, LLC 12:00 12:45 This session will provide you with a comprehensive overview of the areas of scrutiny for some ecommerce merchant practices. Understand the types of vulnerabilities in business practices and potential areas of increased scrutiny. Identify trends and return to your company with increased understanding of the types of inquiries that should be a part of enhanced due diligence. Lunch / Exhibitors / Networking 12:45 13:45 Understanding Your Fraud Business to Better Partner with Out-source Vendors Christine Brundage, Global Solutions Leader, MasterCard Worldwide 13:45 14:25 In today's market, many issuers choose to partner with third-party vendors to manage their fraud program. This partnership takes many forms, but in all forms, one thing is certain - you must understand all aspects of your fraud business to gain the most benefit from this arrangement. In this session, learn how issuers can gain new insights and use this information to optimize the relationship with their vendors. AGENDA 3
4 Effective Fraud Reduction Strategies Through Better Analytics and Real-Time Scoring John Verdeschi, Senior Business Leader, MasterCard Worldwide 14:25 15:10 Fraud is constantly evolving and can occur on both compromised and non-compromised accounts. Issuers face a significant challenge in monitoring transactions for fraud and make spilt-second decisions on authorizing or declining transactions, closing accounts, and possibly reissuing accounts. To do so effectively, issuers need to be confident in their decision making capabilities and require an objective viewpoint on fraud prediction. In this session, participants will learn about the MasterCard Expert Monitoring Solution and Compromised Account Service, and hear about how these technologies can generate tremendous results in the war on fraud. Coffee Break / Exhibitors 15:10-15:30 Update on MasterCard Compliance Programs Paul Paolucci, Business Leader, MasterCard Worldwide 15:30 16:30 Card Security & ARM Products Update Ravi Aurora, Senior Business Leader, MasterCard Worldwide 16:30 17:00 Closing Remarks: End of Security Summit 17:00 17:15 Thursday February 17, 2011 PCI: Lessons to be Learned from Data Breaches Joshua Knopp, Business Leader, MasterCard Worldwide Examine case studies based on real world forensic investigations that will help you learn to recognize the warning signs that present themselves prior to an account data compromise. Review the detection and prevention practices that your organization can implement to prevent a potentially damaging breach from occurring. See Agenda below: 9:00 17:00 PCI Training Agenda Welcome & Introductions Security Landscape and Account Data Compromise Trends Updates on the PCI Security standards Council Coffee Break Overview of the PCI Data Security Standards Lunch Case Study Approach to Implementing PCI Requirements: Small & Medium Merchant Case Studies Coffee Break Case Study Approach to Implementing PCI Requirements: Medium Merchant and Large Processor Case Studies AGENDA 4
5 Friday February 18, 2011 (Location: MasterCard Office: 16 Floor, Sandton City Office Tower Cnr Rivonia Rd and 5th Street, Sandton :00 15:00 E-Commerce Merchant Boarding and Monitoring Procedures (With specific focus on High Risk Merchant categories) Bob Caldwell, Partner, G2 Web Services, LLC Paul Paolucci, Business Leader, MasterCard Worldwide 9:00 17:00 This interactive session will allow you to get your questions answered on how to best identify and manage your risk mitigation associated with MasterCard Rules and to employ best practices in early warning and detection of potential and current industry schemes. Hear directly from MasterCard Fraud Detection and Review business leader and the industry experts in risk monitoring, G2 Web Services, to best understand the MasterCard compliance programs, including registration, reporting requirements, monitoring and detection. Return to your company with a better sense of MasterCard s approach to protecting the payments network and steps to improve your own compliance. As an attendee, you will: Gain a comprehensive understanding of the MasterCard Compliance Programs that can help you optimize operations and reduce remediation time Be the first to hear about the new programs and enhancements that are in development to streamline the compliance process for MasterCard customers Network with peers, share ideas and make suggestions around improving program monitoring and execution Learn how to minimize the risks associated with compliance and how to better protect your business reputation and potentially reduce non-compliance events. Examine case studies based on real world forensic investigations that will help you learn to recognize the warning signs that present themselves prior to an account data compromise. Review the detection and prevention practices that your organization can implement to prevent a potentially damaging breach from occurring. AGENDA 5
INNOVATE. COLLABORATE. EDUCATE.
Global Risk Management Conference Middle East & Africa March 11-14, 2013 Cape Town, South Africa AGENDA Please visit our website for updates on our programs (www.mastercard.com/arm) Monday March 11, 2013
More informationFacing Up to the Challenges
Information Security, Data Breaches and Protecting Cardholder Information: Facing Up to the Challenges SEPTEMBER 13-14, 2006 Account Number PIN Number Social Security Number Social Security Number Information
More informationMastercard Global Risk Leadership Conference DRAFT- AGENDA Albufeira, Portugal September 25-28, 2017
Monday, September 25, 2017- Risk Leadership Conference Pre-Conference Sessions Early Registration Pre-Conference Workshop: PCI and Beyond: 3DS2.0, PIN Entry on mpos and more Venue: São Miguel Pre-Conference
More informationCybersecurity and the Board of Directors
Cybersecurity and the Board of Directors Key Findings from BITS/FSR Meetings OVERVIEW Board directors are increasingly required to engage in cybersecurity risk management yet some may need better education
More informationPCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing
PCI DSS 3.1 is here. Are you ready? Mike Goldgof Sr. Director Product Marketing 1 WhiteHat Security Application Security Company Leader in the Gartner Magic Quadrant Headquartered in Santa Clara, CA 320+
More informationExperience Security, Risk, and Governance
Experience Security, Risk, and Governance Agenda and recommended event path 26 28 March Vienna, Austria Contents 3 Welcome 4 Overview 5 Evening Programs 6 Sessions at-a-glance 11 Digital Transformation
More informationSage Data Security Services Directory
Sage Data Security Services Directory PROTECTING INFORMATION ASSETS ENSURING REGULATORY COMPLIANCE FIGHTING CYBERCRIME Discover the Sage Difference Protecting your business from cyber attacks is a full-time
More informationSix Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP
Six Weeks to Security Operations The AMP Story Mike Byrne Cyber Security AMP 1 Agenda Introductions The AMP Security Operations Story Lessons Learned 2 Speaker Introduction NAME: Mike Byrne TITLE: Consultant
More informationMaintaining Trust: Visa Inc. Payment Security Strategy
Maintaining Trust: Visa Inc Payment Security Strategy Ellen Richey 2010 Payments Conference Chicago Federal Reserve Global Electronic Payments Protecting the payment system is a shared responsibility among
More informationLeading the Digital Transformation from the Centre of Government
37th Meeting of Senior Officials from Centres of Government Leading the Digital Transformation from the Centre of Government Dublin, Ireland, 8-9 November 2018 Agenda 2 GOV/PGC/MPM/A(2018)1/REV1 19.00
More informationCyberEdge. End-to-End Cyber Risk Management Solutions
CyberEdge End-to-End Cyber Risk Management Solutions In a rapidly changing landscape, CyberEdge provides clients with an end-to-end risk management solution to stay ahead of the curve of cyber risk. CyberEdge
More informationSWIFT Customer Security Programme
www.pwc.ch/cybersecurity SWIFT Customer Security Programme Mandatory controls: what you have to do to protect your local SWIFT infrastructures SWIFT Customer Security Programme (CSP) The growing number
More informationEvolution of Cyber Attacks
Update from the PCI Security Standards Council Troy Leach, CTO, PCI Security Standards Council Evolution of Cyber Attacks Viruses Worms Trojan Horses Custom Malware Advanced Persistent Threats 1 Modern
More informationSTOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions.
Intelligence-driven security STOPS CYBER ATTACKS BEFORE THEY STOP YOU. Prepare, recognize, and respond to today s attacks earlier with Verizon Security Solutions. BETTER INTELLIGENCE. BETTER DEFENSE. The
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationSite Data Protection (SDP) Program Update
Advanced Payments October 9, 2006 Site Data Protection (SDP) Program Update Agenda Security Landscape PCI Security Standards Council SDP Program October 9, 2006 SDP Program Update 2 Security Landscape
More informationWill you be PCI DSS Compliant by September 2010?
Will you be PCI DSS Compliant by September 2010? Michael D Sa, Visa Canada Presentation to OWASP Toronto Chapter Toronto, ON 19 August 2009 Security Environment As PCI DSS compliance rates rise, new compromise
More informationAn ICS Whitepaper Choosing the Right Security Assessment
Security Assessment Navigating the various types of Security Assessments and selecting an IT security service provider can be a daunting task; however, it does not have to be. Understanding the available
More informationPCI DSS Compliance and the Cloud
PCI DSS Compliance and the Cloud Daniel Farr, Managing Consultant CyberSecurity Consulting PCI & Compliance Services DF&IR Risk Reduction Solutions www.foregenix.com A Brief History of Foregenix Foregenix
More informationNavigating the PCI DSS Challenge. 29 April 2011
Navigating the PCI DSS Challenge 29 April 2011 Agenda 1. Overview of Threat and Compliance Landscape 2. Introduction to the PCI Security Standards 3. Payment Brand Compliance Programs 4. PCI DSS Scope
More informationCYBER SOLUTIONS & THREAT INTELLIGENCE
CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world
More informationBackground FAST FACTS
Background Terra Verde was founded in 2008 by cybersecurity, risk and compliance executives. The founders believed that the market needed a company that was focused on using security, risk and compliance
More informationCyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.
Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK. In today s escalating cyber risk environment, you need to make sure you re focused on the right priorities by
More informationChoosing the Right Security Assessment
A Red Team Whitepaper Choosing the Right Security Navigating the various types of Security s and selecting an IT security service provider can be a daunting task; however, it does not have to be. Understanding
More informationLeasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands
Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress
More informationJune 2012 First Data PCI RAPID COMPLY SM Solution
June 2012 First Data PCI RAPID COMPLY SM Solution You don t have to be a security expert to be compliant. Developer: 06 Rev: 05/03/2012 V: 1.0 Agenda Research Background Product Overview Steps to becoming
More informationForensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services
Forensic Technology & Discovery Services Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services Forensic Technology & Discovery Services EY s Forensic
More informationYour guide to the Payment Card Industry Data Security Standard (PCI DSS) banksa.com.au
Your guide to the Payment Card Industry Data Security Standard (PCI DSS) 1 13 13 76 banksa.com.au CONTENTS Page Contents 1 Introduction 2 What are the 12 key requirements of PCIDSS? 3 Protect your business
More informationDynamic Transformation of the Energy Industry JUNE 25-27, 2019 COEUR D ALENE, IDAHO REGISTRATION
9 th ANNUAL A select group of C-suite panelists and key stakeholders will engage participants in dynamic discussion and debate about the transformational change taking place in today s energy industry.
More informationTexas Department of Banking United States Secret Service January 25, 2012
Texas Department of Banking United States Secret Service January 25, 2012 Presented by: Texas Department of Banking Banking Commissioner Charles G. Cooper Deputy Commissioner Bob Bacon Chief IT Security
More informationThe University of Queensland
UQ Cyber Security Strategy 2017-2020 NAME: UQ Cyber Security Strategy DATE: 21/07/2017 RELEASE:0.2 Final AUTHOR: OWNER: CLIENT: Marc Blum Chief Information Officer Strategic Information Technology Council
More informationCYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018
CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018 Cyber fraud attacks happen; they can t all be stopped. The higher order question must be how can we, as fraud examiners and assurance professionals,
More informationRisk Advisory Academy Training Brochure
Academy Brochure 2 Academy Brochure Cyber Security Our Cyber Security trainings are focused on building your internal capacity to leverage IT related technologies more confidently and manage risk and uncertainty
More informationCanada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?
Canada Highlights Cybersecurity: Do you know which protective measures will make your company cyber resilient? 21 st Global Information Security Survey 2018 2019 1 Canada highlights According to the EY
More informationCipherithm LLC 2013 PCI SSC North America Community Meeting Notes
Cipherithm LLC 2013 PCI SSC North America Community Meeting Notes A Cipherithm White Paper Document Version 1.00 Publish date: Sept 30, 2013 DISCLAIMER This publication is proprietary and confidential
More informationMeasuring Cyber Risk Understanding the Right Data Sources. Sponsored By:
Measuring Cyber Risk Understanding the Right Data Sources Sponsored By: Measuring Cyber Risk Understanding the Right Data Sources Visit www.advisenltd.com at the end of this webinar to download: Copy of
More informationEndpoint Security for Wholesale Payments
Endpoint Security for Wholesale Payments 2018 CHICAGO PAYMENTS SYMPOSIUM EMILY CARON MANAGER, FMI RISK & POLICY FEDERAL RESERVE BOARD The views expressed in this presentation are those of the speaker and
More informationTOP RISK CONCERNS MERCHANT DATA BREACHES. Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions
TOP RISK CONCERNS MERCHANT DATA BREACHES Presented by Ann Davidson, VP of Risk Consulting at Allied Solutions Today s Webinar Will Cover: Current state of merchant data breaches Impact of merchant data
More informationPROVIDING INVESTIGATIVE SOLUTIONS
PROVIDING INVESTIGATIVE SOLUTIONS Experienced Professionals Northeast Intelligence Group, Inc. (NEIG) has been helping clients meet challenges for more than twenty years. By providing meaningful and timely
More informationApplication Security at Scale
Jake Marcinko Standards Manager, PCI Security Standards Council Jeff Williams CTO, Contrast Security Application Security at Scale AppSec at Scale Delivering Timely Security Solutions / Services to Meet
More informationCredit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank
Credit Union Cyber Crisis: Gaining Awareness and Combatting Cyber Threats Without Breaking the Bank Introduction The 6,331 credit unions in the United States face a unique challenge when it comes to cybersecurity.
More informationManaging Risk in the Digital World. Jose A. Rodriguez, Director Visa Consulting and Analytics
Managing Risk in the Digital World Jose A. Rodriguez, Director Visa Consulting and Analytics What is driving the security landscape? Innovation New entrants New technologies New business models Data Compromises
More informationService. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution
Service SM Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution Product Protecting sensitive data is critical to being
More informationInternational Exhibition and Conference on Security & Safety. March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE
PROTECT 2019 International Exhibition and Conference on Security & Safety March 27-28, 2019 l New World Makati Hotel, Manila, Philippines E-BROCHURE WHAT IS PROTECT? The only government-private sector
More informationInfoSec Risks from the Front Lines
InfoSec Risks from the Front Lines Adam Brand, Protiviti Orange County IIA Seminar Who I Am Adam Brand IT Security Services Some Incident Response Experience Lead Breach Detection Audits @adamrbrand Who
More informationPONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY
PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY Benchmark research sponsored by Raytheon. Independently conducted by Ponemon Institute LLC. February 2018 2018 Study on
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationSymantec Security Monitoring Services
24x7 real-time security monitoring and protection Protect corporate assets from malicious global threat activity before it impacts your network. Partnering with Symantec skilled and experienced analysts
More informationAnnual Financial Services Cyber Security Summit
rd 3 Annual Financial Services Cyber Security Summit Wednesday 13th July 2016 Peter Oakes, Fintech Ireland / Fintech UK 1 Peter Oakes Executive and non-executive director and advisory committee member
More informationToday s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches
Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches Chris Bucolo, PCIP, MBA Today s Speaker Chris Bucolo Sr. Manager, Sikich
More informationThe rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services
The rise of major Adversaries is the most relevant trend in 2014, targeting Government and Critical Services Major Trends of 2014 And relevant changes in Threat Scenario Most Target Countries and Sectors
More informationDATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI
DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI EXECUTIVE SUMMARY The shortage of cybersecurity skills Organizations continue to face a shortage of IT skill
More informationEXPLORE the intersection between business continuity and emergency management and corporate/organizational security.
THE COUNCIL ON EMERGENCY MANAGEMENT Business Continuity October 4 th and 5 th, 2017 Halifax Agenda Accommodation: Four Points by Sheraton 1496 Hollis St. 902-423-4444 Meeting Location Meeting Objectives:
More informationTIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE
TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE Association of Corporate Counsel NYC Chapter 11/1 NYC BDO USA, LLP, a Delaware limited liability partnership,
More informationIncident Response Services
Services Enhanced with Supervised Machine Learning and Human Intelligence Empowering clients to stay one step ahead of the adversary. Secureworks helps clients enable intelligent actions to outsmart and
More informationSecuring Your Digital Transformation
Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,
More informationAll the Latest Data Security News. Best Practices and Compliance Information From the PCI Council
All the Latest Data Security News Best Practices and Compliance Information From the PCI Council 1 What is the PCI Security Standards Council? Collaboration Education Simplified solutions for merchants
More informationCENTRAL TAKE THE STAGE REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN
CENTRAL REGIONAL CONFERENCE MAY 1 4, 2016 / NASHVILLE, TN TAKE THE STAGE Members: Register by Feb. 29 to save US$100. Take the Stage The IIA and IIA Nashville Chapter are excited to host the 2016 Central
More informationEnhancing the Cybersecurity of Federal Information and Assets through CSIP
TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3
More informationCyber Security and Cyber Fraud
Cyber Security and Cyber Fraud Remarks by Andrew Ross Director, Payments and Cyber Security Canadian Bankers Association for Senate Standing Committee on Banking, Trade, and Commerce October 26, 2017 Ottawa
More informationSecurity. Made Smarter.
Security. Made Smarter. Your job is to keep your organization safe from cyberattacks. To do so, your team has to review a monumental amount of data that is growing exponentially by the minute. Your team
More informationWebinar: How to keep your hotel guest data secure
Webinar: How to keep your hotel guest data secure Securing your hotel guest data Wednesday April 18, 2018 2:00 pm ET WEBINAR HOST Joshua Molina Ed Vasko Chief Executive Officer QUESTIONS? Type them in
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)
ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary
More informationProtecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition
VIENNA CYBER SECURITY WEEK 2018 Protecting Critical Energy Infrastructure International Multistakeholder Conference, Training & Exhibition SECURITY & DIPLOMACY 29-30 January 15A Favoritenstraße, 1040 Taubstummengasse
More informationOPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30
OPERATIONAL ANALYTICS AND ACQUISITION FOCUS DAY MONDAY, APRIL 30 Operational Analytics is an interactive day dedicated to delivering overmatch capabilities and actionable intelligence to decision makers.
More informationPCI DATA SECURITY STANDARDS VERSION 3.2. What's Next?
PCI DATA SECURITY STANDARDS VERSION 3.2 What's Next? Presenters Alan Gutierrez Arana Director National PCI Leader RSM US LLP Gus Orologas, QSA Manager RSM US LLP Travis Wendling, QSA Supervisor RSM US
More informationCyber Security Incident Response Fighting Fire with Fire
Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the
More informationSecuring intelligent networks: a guide for CISO and CIOs
Securing intelligent networks: a guide for CISO and CIOs 2 Securing intelligent networks: a guide for CISO and CIOs 3 93% say security is a must have or should have for customers of SD-WAN technology;
More informationDell helps you simplify IT
Dell helps you simplify IT Workshops the first step. Reduce desktop and data center complexity. Improve productivity. Innovate. Dell IT Consulting Services New Edition 2011 Introduction Are you spending
More informationMASTERCARD EUROPE RISK LEADERSHIP CONFERENCE DRAFT- Split, Croatia
Monday, September 26, 2016 - Pre-Conference Sessions Pre-Conference Sessions Early Conference Registration and Registration for Pre-Conference Sessions Pre-Conference Workshop Lunch Don t Feel Compromised:
More informationWhat It Takes to be a CISO in 2017
What It Takes to be a CISO in 2017 Doug Copley Deputy CISO Sr. Security & Privacy Strategist February 2017 IMAGINE You re the CISO In Bangladesh Of a bank On a Friday when you re closed You realize 6 huge
More informationEscaping PCI purgatory.
Security April 2008 Escaping PCI purgatory. Compliance roadblocks and stories of real-world successes Page 2 Contents 2 Executive summary 2 Navigating the road to PCI DSS compliance 3 Getting unstuck 6
More informationCanada Life Cyber Security Statement 2018
Canada Life Cyber Security Statement 2018 Governance Canada Life has implemented an Information Security framework which supports standards designed to establish a system of internal controls and accountability
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationPublic Sector Cyber Security Series
2018 Staying ahead of evolving threats Public Sector Cyber Security Series program Sydney 10 th September Melbourne 11 th September Canberra 12 th September Brisbane 19 th September Wellington 20 th September
More informationin collaboration with
in collaboration with Table of Contents 01 Turn Silos of Data into Operational Intelligence page 04 02 Gain a Competitive Advantage with Cisco and Splunk page 06 03 Improve Insight with IT Operations Analytics
More informationSECURITY SERVICES SECURITY
SECURITY SERVICES SECURITY SOLUTION SUMMARY Computacenter helps organisations safeguard data, simplify compliance and enable users with holistic security solutions With users, data and devices dispersed
More informationMobile Security / Mobile Payments
Mobile Security / Mobile Payments Leslie K. Lambert CISSP, CISM, CISA, CRISC, CIPP/US, CIPP/G VP, Chief Information Security Officer Juniper Networks Professional Techniques - Session T23 MOBILE SECURITY
More informationCYBER RESILIENCE & INCIDENT RESPONSE
CYBER RESILIENCE & INCIDENT RESPONSE www.nccgroup.trust Introduction The threat landscape has changed dramatically over the last decade. Once the biggest threats came from opportunist attacks and preventable
More informationCyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda September 2016
Cyber Intelligence Professional Certificate Program Booz Allen Hamilton 2-Day Seminar Agenda 21-22 September 2016 DAY 1: Cyber Intelligence Strategic and Operational Overview 8:30 AM - Coffee Reception
More information10 Cybersecurity Questions for Bank CEOs and the Board of Directors
4 th Annual UBA Bank Executive Winter Conference February, 2015 10 Cybersecurity Questions for Bank CEOs and the Board of Directors Dr. Kevin Streff Founder, Secure Banking Solutions 1 Board of Directors
More informationSUMMIT ON CYBERSECURITY IN CIVIL AVIATION EUROPE, MIDDLE EAST AND AFRICA (EMEA)
DRAFT Hosted by: TENTATIVE PROGRAMME SUMMIT ON CYBERSECURITY IN CIVIL AVIATION EUROPE, MIDDLE EAST AND AFRICA (EMEA) Bucharest, Romania 7 to 9 May 2018 as of 19 March 2018 OPENING SESSION Welcome remarks
More informationINFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare
INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore
More informationMeeting PCI DSS 3.2 Compliance with RiskSense Solutions
Meeting PCI DSS 3.2 Compliance with Solutions Platform the industry s most comprehensive, intelligent platform for managing cyber risk. 2018, Inc. What s Changing with PCI DSS? Summary of PCI Business
More informationAchieving Java Application Security With Parasoft Jtest
Achieving Java Application Security With Parasoft Jtest Cloud computing continues to gain traction as enterprises increasingly embrace the shift to Internet-based environments. Unfortunately, this also
More informationCybersecurity Session IIA Conference 2018
www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that
More informationFraud Risks Facing Credit Unions. ALLIED SOLUTIONS LLC SERVICE CENTER 210 East Main Street, Suite 200, Niles, MI Fax:
Fraud Risks Facing Credit Unions Today s Session Global risks Share how the bad guys are getting in Focus on Cyber and Card Risk Discuss what the credit union can do to prevent the risk Open discussion
More informationPCI DSS Compliance for Healthcare
PCI DSS Compliance for Healthcare Best practices for securing payment card data In just five years, criminal attacks on healthcare organizations are up by a stunning 125%. 1 Why are these data breaches
More informationThe Future of PCI: Securing payments in a changing world
The Future of PCI: Securing payments in a changing world Lauren Holloway 2014 Nature of the Threat About the Council PCI DSS Updates Staying Secure How You Can Participate In Closing Agenda Nature of the
More informationHacking and Cyber Espionage
Hacking and Cyber Espionage September 19, 2013 Prophylactic and Post-Breach Concerns for In-House Counsel Raymond O. Aghaian, McKenna Long & Aldridge LLP Elizabeth (Beth) Ferrell, McKenna Long & Aldridge
More informationCybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City
1 Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City The opinions expressed are those of the presenters and are not those of the Federal Reserve Banks, the
More informationIT Audit and Risk Trends for Credit Union Internal Auditors. Blair Bautista, Director Bob Grill, Manager David Dyk, Manager
IT Audit and Risk Trends for Credit Union Internal Auditors Blair Bautista, Director Bob Grill, Manager David Dyk, Manager 1 AGENDA Internet Banking Authentication ATM Security and PIN Compliance Social
More informationMASTERCARD EUROPE RISK LEADERSHIP CONFERENCE DRAFT- Split, Croatia
Monday, September 26, 2016 - Pre-Conference Sessions Pre-Conference Sessions Early Conference Registration and Registration for Pre-Conference Sessions Pre-Conference Workshop Lunch Don t Feel Compromised:
More informationIBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation
IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:
More informationIntroduction to the PCI DSS: What Merchants Need to Know
Introduction to the PCI DSS: What Merchants Need to Know Successfully managing a business in today s environment is, in its own right, a challenging feat. Uncertain economics, increasing regulatory pressures,
More informationManaging Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust
Managing Cyber Risk Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust Adam Thomas Principal Cyber Risk Services Deloitte & Touche LLP Give Us Your Feedback for this Session!
More informationLeasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands
Leasing Life Conference & Awards 30 th November 2017 Hotel Krasnapolsky Amsterdam, Netherlands Leasing Life s conference provides the ideal setting for the industry to come together to discuss its progress
More informationDefensible and Beyond
TELUS Defensible and Beyond Mike Vamvakaris Director and Head of Cyber Security Consulting November 2017 Digital transformation brings many benefits Communication and Collaboration Autonomous and Artificial
More informationMinimizing the PCI Footprint: Reduce Risk and Simplify Compliance
SESSION ID: GRC-F02 Minimizing the PCI Footprint: Reduce Risk and Simplify Compliance Troy Leach CTO PCI Security Standards Council Agenda Today s Landscape Reducing the Card Holder Data Footprint How
More informationProtecting Against Modern Attacks. Protection Against Modern Attack Vectors
Protecting Against Modern Attacks Protection Against Modern Attack Vectors CYBER SECURITY IS A CEO ISSUE. - M C K I N S E Y $4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches
More information