Modeling Cyber-Insurance

Size: px
Start display at page:

Download "Modeling Cyber-Insurance"

Transcription

1 Interational Computer Science Institute & University of California, Berkeley Modeling Cyber-Insurance Towards a Unifying Framework Rainer Böhme, Galina Schwartz Networking Group, ICSI Berkeley EECS, UC Berkeley Workshop on the Economics of Information Security, Harvard, 8 June 2010

2 Talks on Cyber-Insurance at WEIS enthusiasm obstacles WEIS, Harvard, 8 June 2010 Slide 2 of 26

3 Outline 1. Characteristics of Cyber-Risk 2. Framework Overview 3. Selected Features Network topology Unified approach to interdependent security and correlated risk 4. Results and Conclusion WEIS, Harvard, 8 June 2010 Slide 4 of 26

4 1 Characteristics of Cyber-Risk WEIS, Harvard, 8 June 2010 Slide 5 of 26

5 What Is Specific to Cyber-Risk? success factors of ICT risk properties + distribution & interconnection interdependent security own risk depends on other parties actions universality & reuse risk propagation & correlation incidents cause further incidents = complexity imperfect information WEIS, Harvard, 8 June 2010 Slide 6 of 26

6 Examples Conventional risks in the economic insurance literature neither interdependence nor correlation Airline baggage security interdependence, but no correlation Natural disasters in the actuarial literature spatial correlation, but no interdependence Kunreuther & Heal, 2003 Cyber-insurance Embrechts et al., 1999 both interdependence and correlation, but never modeled together WEIS, Harvard, 8 June 2010 Slide 7 of 26

7 Talks on Cyber-Insurance at WEIS interdependent security (IDS) correlated risk information asymmetries enthusiasm obstacles WEIS, Harvard, 8 June 2010 Slide 8 of 26

8 Risk Properties in the Cyber-Insurance Literature information asymmetries Bandyopadhyay et al., 2009 Böhme, 2005 Böhme & Kataria, 2006 Shetty et al., 2009 Radosavac et al., 2008 Ogut et al., 2005 Hofmann, 2007 Bolot & Lelarge, 2008 Lelarge & Bolot, 2009 correlated risk interdependent security (IDS) WEIS, Harvard, 8 June 2010 Slide 9 of 26

9 2 Framework Overview WEIS, Harvard, 8 June 2010 Slide 10 of 26

10 Framework 1. network environment (nodes) design utility risk 2. demand side (agents) risk 3. supply side (insurers) WEIS, Harvard, 8 June 2010 Slide 11 of 26

11 Talks on Cyber-Insurance at WEIS market models enthusiasm obstacles WEIS, Harvard, 8 June 2010 Slide 12 of 26

12 Framework 1. network environment (nodes) design utility risk 2. demand side (agents) risk 3. supply side (insurers) WEIS, Harvard, 8 June 2010 Slide 13 of 26

13 Framework nature players 1. network environment (nodes) 2. demand side (agents) 3. supply side (insurers) WEIS, Harvard, 8 June 2010 Slide 13 of 26

14 Framework 4. information structure 1. network environment (nodes) 2. demand side (agents) 3. supply side (insurers) 5. organizational environment WEIS, Harvard, 8 June 2010 Slide 13 of 26

15 Overview of Model Attributes 1. network environment 2. demand side 3. supply side defense function node control market structure network topology heterogeneity insurers risk aversion risk arrival agents risk aversion markup attacker model action space contract design time higher-order risk transfer 4. information structure 5. organizational environment IA in conventional insurance IA specific to cyber-insurance timing regulator ICT manufacturers network intermediaries security service providers WEIS, Harvard, 8 June 2010 Slide 14 of 26

16 Variables of Interest Breadth of market Under which conditions will a market for cyber-insurance thrive? Network security Can we expect fewer attacks if cyber-insurance is broadly adopted? Social welfare Will the world be a better place with cyber-risk reallocation? WEIS, Harvard, 8 June 2010 Slide 15 of 26

17 3 Selected Features WEIS, Harvard, 8 June 2010 Slide 16 of 26

18 Network Topology Examples ideosyncratic fully connected single-factor model Erdös-Rényi graph hardware failure spam OS vulnerability inter-organizational dependence Comprehensive insurance policies represent bundles of contracts. WEIS, Harvard, 8 June 2010 Slide 17 of 26

19 Unified Approach to IDS and Correlation Defense function for node i: P (L i = l) = D(l, w i, s, G, x) l size of loss (random variable L i ) w i s G initial wealth vector of security investments: s = s i s j i network topology as model of interconnectedness Simplification: fix w and normalize l = 1, then let p i be the probability of a loss at node i and X {0, 1} n be a random vector of realized losses per node. Proposition: interdependent security and correlated risk can be modeled jointly by making s and realizations x of X parameters of D. WEIS, Harvard, 8 June 2010 Slide 18 of 26

20 Illustration Node i security s i D connected in G interdependent security Node j security s j D probability p i nature loss event x i correlated risk probability p j nature loss event x j Risk propagation is hard to tract: the modeling requires recursive methods or approximations and it may lead to dynamic equilibria. WEIS, Harvard, 8 June 2010 Slide 19 of 26

21 4 Results and Conclusion WEIS, Harvard, 8 June 2010 Slide 20 of 26

22 Dependent Variables in the Cyber-Insurance Literature social welfare Shetty et al., 2009 Bandyopadhyay et al., 2009 Böhme, 2005 Böhme & Kataria, 2006 Ogut et al., 2005 Hofmann, 2007 Radosavac et al., 2008 Bolot & Lelarge, 2008 Lelarge & Bolot, 2009 breadth of market network security WEIS, Harvard, 8 June 2010 Slide 21 of 26

23 Discrepancy between Statements and Models Cyber-insurers will improve information about security levels;... but relevant parameters not included in the model. Cyber-insurers will positively affect agents decisions in shaping the network environment;... but existing models of contracts do not reflect these choices. Broad adoption of cyber-insurerance will change the market structure and behavior of ICT manufacturers;... but never modeled parametrically. WEIS, Harvard, 8 June 2010 Slide 22 of 26

24 Endogenize! Future modeling approaches should endogenize key parameters of the network environment, information structure, and organizational environment. Example: endogenous network formation to model platform switching dynamics WEIS, Harvard, 8 June 2010 Slide 23 of 26

25 Framework 4. information structure 1. network environment (nodes) design utility risk 2. demand side (agents) risk 3. supply side (insurers) 5. organizational environment WEIS, Harvard, 8 June 2010 Slide 24 of 26

26 Endogenize! Future modeling approaches should endogenize key parameters of the network environment, information structure, and organizational environment. Example: endogenous network formation to model platform switching dynamics Policy recommendations need better foundations in analytical models. WEIS, Harvard, 8 June 2010 Slide 25 of 26

27 Talks on Cyber-Insurance at WEIS enthusiasm obstacles WEIS, Harvard, 8 June 2010 Slide 26 of 26

28 Talks on Cyber-Insurance at WEIS enthusiasm obstacles WEIS, Harvard, 8 June 2010 Slide 26 of 26

29 Interational Computer Science Institute & University of California, Berkeley Q & A Thank you for your attention. Rainer Böhme, Galina Schwartz Networking Group, ICSI Berkeley EECS, UC Berkeley Workshop on the Economics of Information Security, Harvard, 8 June 2010

Contagion in Cybersecurity Attacks

Contagion in Cybersecurity Attacks Outline of Talk Introduction and Related Literature Berlin, June 2012 Adrian Baldwin, HP Labs, Bristol Iffat Gheyas, University of Aberdeen Christos Ioannidis, University of Bath David Pym, University

More information

The Global Cybercrime Industry

The Global Cybercrime Industry Nir Kshetri The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives 4y Springer 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and

More information

Contents The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures

Contents The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures Contents 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and Countermeasures... 1 1.1 The Rapidly Rising Global Cybercrime Industry... 1 1.1.1 Cybercrime: Definitional

More information

Examining Cooperative Strategies through Cyber Exercises

Examining Cooperative Strategies through Cyber Exercises Examining Cooperative Strategies through Cyber Exercises Presented to March Technical Colloquium Forum for Incident Response and Teams (FIRST) Ernest W. Drew, III March 26,2008 Tokyo, Japan Cyber Conflict

More information

Integrating Distributed Resources into Distribution Planning and Operations R&D Priorities

Integrating Distributed Resources into Distribution Planning and Operations R&D Priorities Integrating Distributed Resources into Distribution Planning and Operations R&D Priorities Mark McGranaghan Jason Taylor Electric Power Research Institute CIRED Workshop 2016 Helsinki Theme 2: Resilient

More information

Systemic Analyser in Network Threats

Systemic Analyser in Network Threats Systemic Analyser in Network Threats www.project-saint.eu @saintprojecteu #saintprojecteu John M.A. Bothos jbothos@iit.demokritos.gr Integrated System Laboratory Institute of Informatics & Telecommunication

More information

Improving SCADA System Security

Improving SCADA System Security Improving SCADA System Security NPCC 2004 General Meeting Robert W. Hoffman Manager, Cyber Security Research Department Infrastructure Assurance and Defense Systems National Security Division, INEEL September

More information

How to Assess the Financial Impact of Cyber Risk

How to Assess the Financial Impact of Cyber Risk How to Assess the Financial Impact of Cyber Risk MODERATOR: Justin Somaini Symantec Corporation PANELISTS: Ty Sagalow Zurich North America Tom Jackson Phillips Nizer Larry Clinton Internet Security Alliance

More information

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements

Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements By: Xia Zhao, Ling Xue, and Andrew B. Whinston Zhao, Xia, Ling Xue and Andrew

More information

Human Biases Meet Cybersecurity of Embedded and Networked Systems

Human Biases Meet Cybersecurity of Embedded and Networked Systems Human Biases Meet Cybersecurity of Embedded and Networked Systems Saurabh Bagchi and Shreyas Sundaram School of Electrical and Computer Engineering CERIAS Purdue University Vision for Security of Embedded

More information

Cyber Security What we think and what we know?

Cyber Security What we think and what we know? Cyber Security What we think and what we know? Asbjørn Ueland Principal Engineer Petroleum Safety Authority The stories from the press The incident at Statoil Mongstad 2017 audit at all operators and ship

More information

IASM Support for FISMA

IASM Support for FISMA Introduction Most U.S. civilian government agencies, and commercial enterprises processing electronic data on behalf of those agencies, are concerned about whether and how Information Assurance products

More information

Airport Security & Safety Thales, Your Trusted Hub Partner

Airport Security & Safety Thales, Your Trusted Hub Partner Airport Security & Safety Thales, Your Trusted Hub Partner www.thalesgroup.com/shield Securing People Ensuring Business Continuity Protecting Assets Thales Credentials Thales is a leading international

More information

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23

Risk: Security s New Compliance. Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Risk: Security s New Compliance Torsten George VP Worldwide Marketing and Products, Agiliance Professional Strategies - S23 Agenda Market Dynamics Organizational Challenges Risk: Security s New Compliance

More information

Consolidation Committee Final Report

Consolidation Committee Final Report Committee Details Date: November 14, 2015 Committee Name: 36.6 : Information Security Program Committee Co- Chairs: Ren Flot; Whitfield Samuel Functional Area: IT Functional Area Coordinator: Phil Ventimiglia

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Collaborative Security Management Services for Port Information Systems

Collaborative Security Management Services for Port Information Systems Collaborative Security Management Services for Port Information Systems Theodoros Ntouskas, Dimitris Gritzalis Theodoros Ntouskas, Dimitris Gritzalis December 2015 Collaborative Security Management Services

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity November 2017 cyberframework@nist.gov Supporting Risk Management with Framework 2 Core: A Common Language Foundational for Integrated Teams

More information

Larry Clinton President & CEO Internet Security Alliance

Larry Clinton President & CEO Internet Security Alliance Larry Clinton President & CEO Internet Security Alliance lclinton@isalliance.org 703-907-7028 202-236-0001 Sr. Management & Cyber Security Good News!!! Pricewaterhouse Coopers survey of 9,000 executives

More information

GNOSTECH MARITIME CYBERSECURITY SOLUTIONS

GNOSTECH MARITIME CYBERSECURITY SOLUTIONS GNOSTECH MARITIME CYBERSECURITY SOLUTIONS Disaster Response vs Cyber Incident Response Technologies Facilitates Exceptional Benefits While Creating Cyber Vulnerabilities Shore-based Systems That Directly

More information

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation SCADA/IOT Panel This panel will focus on innovative & emerging solutions and remaining challenges in the cybersecurity of industrial control systems ICS/SCADA. Representatives from government and infrastructure

More information

Cyber risk and insurance

Cyber risk and insurance ACIS symposium Maatschappelijke uitdagingen voor de verzekeringssector Amsterdam September 22, 2017 Cyber risk and insurance Dr. Katsiaryna (Kate) Labunets Safety and Security Sciences group TPM, TU Delft

More information

ISAO SO Product Outline

ISAO SO Product Outline Draft Document Request For Comment ISAO SO 2016 v0.2 ISAO Standards Organization Dr. Greg White, Executive Director Rick Lipsey, Deputy Director May 2, 2016 Copyright 2016, ISAO SO (Information Sharing

More information

Big Data - Security with Privacy

Big Data - Security with Privacy Big Data - Security with Privacy Elisa Bertino CS Department, Cyber Center, and CERIAS Purdue University Cyber Center Today we have technologies for Acquiring and sensing data Transmitting data Storing,

More information

Online Privacy & Security for the Mortgage Industry

Online Privacy & Security for the Mortgage Industry 1 Online Privacy & Security for the Mortgage Industry Ronald M. Jacobs (202) 216-8215 rmjacobs@venable venable.com 2 Online Privacy & Security Overview Gramm-Leach-Bliley Act (GLB) Privacy Regulations:

More information

Security and resilience in Information Society: the European approach

Security and resilience in Information Society: the European approach Security and resilience in Information Society: the European approach Andrea Servida Deputy Head of Unit European Commission DG INFSO-A3 Andrea.servida@ec.europa.eu What s s ahead: mobile ubiquitous environments

More information

Acalvio Deception and the NIST Cybersecurity Framework 1.1

Acalvio Deception and the NIST Cybersecurity Framework 1.1 Acalvio Deception and the NIST Cybersecurity Framework 1.1 June 2018 The Framework enables organizations regardless of size, degree of cybersecurity risk, or cybersecurity sophistication to apply the principles

More information

The GenCyber Program. By Chris Ralph

The GenCyber Program. By Chris Ralph The GenCyber Program By Chris Ralph The Mission of GenCyber Provide a cybersecurity camp experience for students and teachers at the K-12 level. The primary goal of the program is to increase interest

More information

Trusted Routing in IoT

Trusted Routing in IoT Trusted Routing in IoT Dr Ivana Tomić In collaborat ion w it h: Re s e arc h As s oc iate Prof. Julie A. McC ann and Im perial C ollege London AESE group Em ail: i.tom ic@ im perial.ac.uk Outline q Sensors

More information

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014 Document WTDC14/28- E 10 February 2014 Original: French SOURCE: TITLE: ALG/28/1 Objective: 3 Ministry of Post and

More information

MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns

MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns MIDTERM EXAMINATION Networked Life (NETS 112) November 21, 2013 Prof. Michael Kearns This is a closed-book exam. You should have no material on your desk other than the exam itself and a pencil or pen.

More information

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT

Harmonisation of Digital Markets in the EaP. Vassilis Kopanas European Commission, DG CONNECT Harmonisation of Digital Markets in the EaP Vassilis Kopanas European Commission, DG CONNECT vassilis.kopanas@ec.europa.eu The cost of non-europe European Parliament Research Study, March 2014 Fully realising

More information

deep (i) the most advanced solution for managed security services

deep (i) the most advanced solution for managed security services deep (i) the most advanced solution for managed security services TM deep (i) suite provides unparalleled threat intelligence and incident response through cutting edge Managed Security Services Cybersecurity

More information

Security Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security

Security Metrics Establishing unambiguous and logically defensible security metrics. Steven Piliero CSO The Center for Internet Security Security Metrics Establishing unambiguous and logically defensible security metrics Steven Piliero CSO The Center for Internet Security The Center for Internet Security (CIS) Formed - October 2000 As a

More information

GDPR Update and ENISA guidelines

GDPR Update and ENISA guidelines GDPR Update and ENISA guidelines 2016 [Type text] There are two topics that should be uppermost in every CISO's mind, how to address the growing demand for Unified Communications (UC) and how to ensure

More information

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO

Effective: 12/31/17 Last Revised: 8/28/17. Responsible University Administrator: Vice Chancellor for Information Services & CIO Effective: 12/31/17 Last Revised: 8/28/17 Responsible University Administrator: Vice Chancellor for Information Services & CIO Responsible University Office: Information Technology Services Policy Contact:

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach. By Christopher Ganizani Banda ICT Development Manager Malawi Communications Regulatory Authority 24-26th July,2016 Khartoum,

More information

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment Fundamentals of Cybersecurity/CIIP Building Capacity: Using a National Strategy & Self- Presented to: 2009 ITU Regional Cybersecurity Forum for Asia-Pacific Connecting the World Responsibly 23-25 25 September

More information

Davidson Technologies: A Medium Sized Business Experience with DFARS 7012/NIST

Davidson Technologies: A Medium Sized Business Experience with DFARS 7012/NIST Davidson Technologies: A Medium Sized Business Experience with DFARS 7012/NIST 800-171 Davidson Technologies Founded in 1996 by Dr. Julian Davidson Father of Missile Defense in America Sen. Jeff Sessions

More information

Modelling Cyber Security Risk Across the Organization Hierarchy

Modelling Cyber Security Risk Across the Organization Hierarchy Modelling Cyber Security Risk Across the Organization Hierarchy Security issues have different causes and effects at different layers within the organization one size most definitely does not fit all.

More information

Bontempiorgel. Mar7n LATZENHOFER

Bontempiorgel. Mar7n LATZENHOFER Bontempiorgel Mar7n LATZENHOFER Bontempiorgel Behoerdennetzwerk Implementierungsvorschlag für eine Staatsgrundnetzlösung Public Authori@es Network Implementa@on Proposal for a Governmental Network Solu@on

More information

Measuring Cyber Risk Understanding the Right Data Sources. Sponsored By:

Measuring Cyber Risk Understanding the Right Data Sources. Sponsored By: Measuring Cyber Risk Understanding the Right Data Sources Sponsored By: Measuring Cyber Risk Understanding the Right Data Sources Visit www.advisenltd.com at the end of this webinar to download: Copy of

More information

End-to-End Trust, Segmentation and Segregation in the IIoT

End-to-End Trust, Segmentation and Segregation in the IIoT End-to-End Trust, Segmentation and Segregation in the IIoT www.blackridge.us Michael Murray - SVP & GM Cyber Physical Systems www.blackridge.us Company Origin BlackRidge technology originated from a Department

More information

Be Secure! Computer Security Incident Response Team (CSIRT) Guide. Plan Establish Connect. Maliha Alam Mehreen Shahid

Be Secure! Computer Security Incident Response Team (CSIRT) Guide. Plan Establish Connect. Maliha Alam Mehreen Shahid Computer Security Incident Response Team (CSIRT) Guide Maliha Alam Mehreen Shahid Plan Establish Connect Be Secure! CSIRT Coordination Center Pakistan 2014 i Contents 1. What is CSIRT?... 1 2. Policy,

More information

Industry role moving forward

Industry role moving forward Industry role moving forward Discussion with National Research Council, Workshop on the Resiliency of the Electric Power Delivery System in Response to Terrorism and Natural Disasters February 27-28, 2013

More information

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE 2017 COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE NUMBER OF SECURITY BREACHES IS RISING AND SO IS SPEND Average number of security breaches each year 130 Average

More information

ISSA Guidelines on Information and Communication Technology: Overview

ISSA Guidelines on Information and Communication Technology: Overview ISSA Guidelines on Information and Communication Technology: Overview Raul Ruggia-Frick ISSA Secretariat ISSA Guidelines Information and Communication Technology 2 Outline Context The Guidelines on Information

More information

Intro to Capture the Flag

Intro to Capture the Flag Intro to Capture the Flag Talk for General Audience: Why Capture the Flag (CTFs) Matter. Synopsis: CTFs are one example of a gamified learning environment. Gamified ecosystems pose many benefits to professional

More information

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity

Understanding Cyber Insurance & Regulatory Drivers for Business Continuity Understanding Cyber Insurance & Regulatory Drivers for Business Continuity Lily Yeoh, CISSP, CBCP lily@cb1security.com https://www.cb1security.com Agenda BC/DR Business Drivers Recent Regulatory & Cyber

More information

Promoting Global Cybersecurity

Promoting Global Cybersecurity Promoting Global Cybersecurity Presented to ITU-T Study Group 17 Geneva, Switzerland 6 October 2005 Robert Shaw ITU Internet Strategy and Policy Advisor ITU Strategy and Policy Unit 1 Agenda Critical Infrastructures

More information

Overview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project

Overview. Objectives. Components. Information and Communication Technologies Sector Development Project. Project Ministry of Communication Technologies Information and Communication Technologies Sector Development Project Video conference on from strategy to implementation: Lessons learned in World Bank funded ICT

More information

CYBERSECURITY INITIATIVES IN VANUATU

CYBERSECURITY INITIATIVES IN VANUATU CYBERSECURITY INITIATIVES IN VANUATU OUTLINE COUNTRY OVERVIEW TELECOMMUNICATIONS/ICT SECTOR REFORM PROGRAM MODERN BUSINESS ENABLING ENVIRONMENT POLICIES RELATING TO TELECOMMS POLICIES RELATING TO ICT LESSONS

More information

SECURING YOUR ASSETS / company_presentation_en_v1.00 / RG-C0

SECURING YOUR ASSETS / company_presentation_en_v1.00 / RG-C0 SECURING YOUR ASSETS 2018 / company_presentation_en_v1.00 / RG-C0 FACTS LOCATION OFFICE BERN Eigerstrasse 60 3007 Bern OFFICE ZURICH Hardturmstrasse 103 8005 Zürich ETABLISHMENT 2012 LEGAL FORM Stock company,

More information

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic

More information

Information Infrastructure: Cyberspace, Outer Space, and the U.S.-China Security Relationship

Information Infrastructure: Cyberspace, Outer Space, and the U.S.-China Security Relationship Information Infrastructure: Cyberspace, Outer Space, and the U.S.-China Security Relationship Jon R. Lindsay University of California Institute on Global Conflict and Cooperation jrlindsay@ucsd.edu Jiakun

More information

Shon Harris s Newly Updated CISSP Materials

Shon Harris s Newly Updated CISSP Materials Shon Harris s Newly Updated CISSP Materials WHY PURSUE A CISSP? Many companies are beginning to regard a CISSP certification as a requirement for their technical, mid-management, and senior IT management

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

Demystifying GRC. Abstract

Demystifying GRC. Abstract White Paper Demystifying GRC Abstract Executives globally are highly focused on initiatives around Governance, Risk and Compliance (GRC), to improve upon risk management and regulatory compliances. Over

More information

Implementing Executive Order and Presidential Policy Directive 21

Implementing Executive Order and Presidential Policy Directive 21 March 26, 2013 Implementing Executive Order 13636 and Presidential Policy Directive 21 Mike Smith, Senior Cyber Policy Advisor, Office of Electricity Delivery and Energy Reliability, Department of Energy

More information

Securing a Dynamic Infrastructure. IT Virtualization new challenges

Securing a Dynamic Infrastructure. IT Virtualization new challenges Christian Fahlke GMT Channel Leader Internet Security Systems IBM Central & Eastern Europe, Middle East and Africa (CEEMEA) May 20th, 2009 Securing a Dynamic Infrastructure IT Virtualization new challenges

More information

STEVE GOODING JUNE 15, 2018

STEVE GOODING JUNE 15, 2018 ARMOR: THE STATE OF THE INDUSTRY STEVE GOODING JUNE 15, 2018 Agenda 1. Welcome 2. Introduction to Armor 3. Honeypot Report 4. Black Market Report 2 ARMOR IN THE CYBERSECURITY SPACE 3 About Armor DATA CENTERS:

More information

CA Security Management

CA Security Management CA Security CA Security CA Security In today s business environment, security remains one of the most pressing IT concerns. Most organizations are struggling to protect an increasing amount of disparate

More information

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security

Government Resolution No of February 15, Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security Government Resolution No. 2443 of February 15, 2015 33 rd Government of Israel Benjamin Netanyahu Resolution: Advancing National Regulation and Governmental Leadership in Cyber Security It is hereby resolved:

More information

Economics of Cybersecurity II: Stakeholders

Economics of Cybersecurity II: Stakeholders Economics of Cybersecurity II: Stakeholders Introduction By: Natalia Khaniejo Edited: Amber Sinha The cybersecurity ecosystem has several stakeholders involved such as the companies from various sectors

More information

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP TECH BRIEF How BeyondTrust Helps Government Agencies Address Privileged Access Management to Improve Security Contents Introduction... 2 Achieving CSIP Objectives... 2 Steps to improve protection... 3

More information

Cyber Partnership Blueprint: An Outline

Cyber Partnership Blueprint: An Outline Approved for Public Release; Distribution Unlimited. 13-3851 The MITRE Corporation Cyber Partnership Blueprint: An Outline October 26, 2013 Copyright 1997-2013, The MITRE Corporation. All rights reserved.

More information

ACM Retreat - Today s Topics:

ACM Retreat - Today s Topics: ACM Retreat - Today s Topics: Phase II Cyber Risk Management Services - What s next? Policy Development External Vulnerability Assessment Phishing Assessment Security Awareness Notification Third Party

More information

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 www.pwc.com RIMS Perk Session 2015 - Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015 Los Angeles RIMS Agenda Introductions What is Cybersecurity? Crown jewels The bad

More information

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001)

CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001) CompTIA Advanced Security Practitioner (CASP) (Exam CAS-001) Course Outline Course Introduction Course Introduction Lesson 01 - The Enterprise Security Architecture Topic A: The Basics of Enterprise Security

More information

Cyber Security CRA Overview

Cyber Security CRA Overview Cyber Security CRA Overview Patrick McDaniel (PM, PSU) & Edward Colbert (CAM, ARL) cra.psu.edu Approved for public release; distribution is unlimited. Cyber Security Collaborative Research Alliance A Collaborative

More information

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation IBM X-Force 2012 & CISO Survey Cyber Security Threat Landscape 1 2012 IBM Corporation IBM X-Force 2011 Trend and Risk Report Highlights The mission of the IBM X-Force research and development team is to:

More information

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations May 14, 2018 1:30PM to 2:30PM CST In Plain English: Cybersecurity and IT Exam Expectations Options to Join Webinar and audio Click on the link: https://www.webcaster4.com/webcast/page/584/24606 Choose

More information

Delivering Complex Enterprise Applications via Hybrid Clouds

Delivering Complex Enterprise Applications via Hybrid Clouds Whitepaper Delivering Complex Enterprise Applications via Hybrid Clouds As enterprises and industries shake off the effects of the last recession, the focus of IT organizations has shifted from one marked

More information

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) Page 1 of 6 IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT) I. Understanding the need for privacy in the IT environment A. Evolving

More information

NIS Directive : Call for Proposals

NIS Directive : Call for Proposals National Cyber Security Centre, in Collaboration with the Research Institute in Trustworthy Inter-connected Cyber-physical Systems (RITICS) Summary NIS Directive : Call for Proposals Closing date: Friday

More information

How to Write an MSSP RFP. White Paper

How to Write an MSSP RFP. White Paper How to Write an MSSP RFP White Paper Tables of Contents Introduction 3 Benefits Major Items of On-Premise to Consider SIEM Before Solutions Security Writing an RFP and Privacy 45 Benefits Building an of

More information

Skybox Security Vulnerability Management Survey 2012

Skybox Security Vulnerability Management Survey 2012 Skybox Security Vulnerability Management Survey 2012 Notice: This document contains a summary of the responses to a June 2012 survey of 100 medium to large enterprise organizations about their Vulnerability

More information

Security and networks

Security and networks Security and networks Creating a secure business in a hyper connected world SHIV K. BAKHSHI, PH.D. VP, INDUSTRY RELATIONS, GROUP FUNCTION TECHNOLOGY ITU Regional workshop, Algiers, Algeria, FeBruary 12,

More information

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security. #truecybersecurity

Borderless security engineered for your elastic hybrid cloud. Kaspersky Hybrid Cloud Security.  #truecybersecurity Borderless security engineered for your elastic hybrid cloud Kaspersky Hybrid Cloud Security www.kaspersky.com #truecybersecurity Borderless security engineered for your hybrid cloud environment Data

More information

Overview of the Cybersecurity Framework

Overview of the Cybersecurity Framework Overview of the Cybersecurity Framework Implementation of Executive Order 13636 Matt Barrett Program Manager matthew.barrett@nist.gov cyberframework@nist.gov 15 January 2015 Executive Order: Improving

More information

S&T Stakeholders Conference

S&T Stakeholders Conference S&T Stakeholders Conference Risk-Informed Requirements Process Col. Merrick Krause, USAF (Ret.) Director Infrastructure Analysis & Strategy Division U.S. Department of Homeland Security June 2-5, 2008

More information

Risk Management. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

Risk Management. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1 Risk Management Modifications by Prof. Dong Xuan and Adam C. Champion Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Define

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

The NextGen cyber crime battlefield. Why organizations will always lose this battle

The NextGen cyber crime battlefield. Why organizations will always lose this battle The NextGen cyber crime battlefield. Why organizations will always lose this battle Enforce cyber threat intelligence into your organization 10 April 2014 KPMG has been awarded with the Europe Awards as

More information

Klaus-Michael KOCH TECHNIKON Forschungsgesellschaft mbh DRS-workshop Vienna

Klaus-Michael KOCH TECHNIKON Forschungsgesellschaft mbh DRS-workshop Vienna This project has received funding from the European Union s Seventh Framework Programme for research, technological development and demonstration under grant agreement no 607577. Presented by: Klaus-Michael

More information

Framework for Improving Critical Infrastructure Cybersecurity. and Risk Approach

Framework for Improving Critical Infrastructure Cybersecurity. and Risk Approach Framework for Improving Critical Infrastructure Cybersecurity Implementation of Executive Order 13636 and Risk Approach June 9, 2016 cyberframework@nist.gov Executive Order: Improving Critical Infrastructure

More information

Grid Modernization Challenges for the Integrated Grid

Grid Modernization Challenges for the Integrated Grid Grid Modernization Challenges for the Integrated Grid Mark McGranaghan VP, Distribution and Utilization Electric Power Research Institute Wednesday 21 JUN 2017 PowerTech 2017 Manchester The Vision An Integrated

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE 1 WHAT IS YOUR SITUATION? Excel spreadsheets Manually intensive Too many competing priorities Lack of effective reporting Too many consultants Not

More information

OTA Strategic Update Building & Amplifying April 5, 2017

OTA Strategic Update Building & Amplifying April 5, 2017 OTA Strategic Update Building & Amplifying April 5, 2017 Reminders OTA Members Only Chatham House Rules Will be Recorded for Member Access Updated 4/7/17 OTA Strategic Update Building & Amplifying Craig

More information

Data Governance for Smart City Management

Data Governance for Smart City Management The 4th Asia-Pacific Regional Forum on Smart Sustainable Cities and e-government 2018 Data Governance for Smart City Management July 2018 Thanh Hoa City, Vietnam Mi Kyoung Park United Nations Project Office

More information

CYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET?

CYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET? CYBER THREAT IN AVIATION ARE YOU READY TO ADDRESS IT YET? Peter Armstrong, Hong Kong March 2015 GROWING FROM STRENGTH TO STRENGTH... WHY IT MATTERS IT IS A REAL PROBLEM AND IT IS PERVASIVE GOVERNMENTS

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention

More information

Digital solutions for water: linking the physical and digital world

Digital solutions for water: linking the physical and digital world Digital solutions for water: linking the physical and digital world Evdokia Achilleos Senior Project Adviser Horizon 2020 Environment and Resources Connected Smart Cities Conference 2018 Brussels, 11 January

More information

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges Do You Have A Firewall Around Your Cloud? California Cybersecurity Education Summit 2018 Tyson Moler Oracle Security, North America Public Sector Conquering The Big Threats & Challenges Real Life Threats

More information

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE

AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE AUTOTASK ENDPOINT BACKUP (AEB) SECURITY ARCHITECTURE GUIDE Table of Contents Dedicated Geo-Redundant Data Center Infrastructure 02 SSAE 16 / SAS 70 and SOC2 Audits 03 Logical Access Security 03 Dedicated

More information

Building UAE s cyber security resilience through effective use of technology, processes and the local people.

Building UAE s cyber security resilience through effective use of technology, processes and the local people. WHITEPAPER Security Requirement WE HAVE THE IN-HOUSE DEPTH AND BREATH OF INFORMATION AND CYBER SECURIT About Us CyberGate Defense (CGD) is a solution provider for the full spectrum of Cyber Security Defenses

More information

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES

NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES NATIONAL GUIDELINES ON CLOUD COMPUTING FOR GOVERNMENT, MINISTRIES, DEPARTMENTS AND AGENCIES DOCUMENT DETAIL Security Classification Unclassified Authority National Information Technology Authority - Uganda

More information

Automating IT Asset Visualisation

Automating IT Asset Visualisation P a g e 1 It s common sense to know what IT assets you have and to manage them through their lifecycle as part of the IT environment. In practice, asset management is often separate to the planning, operations

More information