HK ASTRI FinTech Initiative

Size: px
Start display at page:

Download "HK ASTRI FinTech Initiative"

Transcription

1 HK ASTRI FinTech Initiative October 2016

2 HK Financial Services Industry (FSI) FSI: one of HK s four pillar industries HK ranked third in the Global Financial Centres Index (GFCI) by London released in September 2015 Employed 236,500 (6.3%), and accounted for 17% of HK s GDP (2014). GDP contribution increased from 13% (2004) to 17% (2014) April 2016

3 ASTRI s Fintech Ecosystem Venture Capital Regulatory Participation Infrastructure Building Startups & Spinoffs Platform Tech Building Talent & Training MNC Collaboration University Collaboration 3 3

4 HKMA ASTRI Fintech Innovation Hub Announced on by HKMA, ceremony on Operational by 4Q16. Targeted Activities: Test solutions which require participation of multi parties Demonstrating Fintech solutions which require substantial computing resources Holding dialogues between the industry and the HKMA on emerging technologies Test solutions that may be adopted by HKMA Organizing training courses for industry 4

5 Joint Fintech Activities with Industry and Universities HKU-ASTRI Joint Research Lab Joint collaboration with ETDA of Thai Govt HKMA-ASTRI Fintech Innovation Hub ASTRI and Police on setting up Cyber Range BOCH-ASTRI FinTech Collaboration Center With HKMA on Cyber Fortification Initiative Cybersecurity Summit with HKMA, HKPF, HKIB FinTech Collaborative Innovation Center with BICI

6 ASTRI FinTech R&D Areas Regulators & Government Mobile Computing Emerging Technologies BDA, AI/DL FinTech Cyber-Security VCs, Incubators, Accelerators Enterprises, Consumers Blockchain

7 ASTRI Security Lab Establish in HK, a world class information security R&D team to provide advanced cyber security consultancy, assessment, and research develop advanced information security technologies nurture local information security experts and practitioners

8 ASTRI Security Lab R&D Team Our engineers Cryptographers Ethical Hackers Reverse Engineers Network Engineers Software Developers Penetration Testers System Architects Biometric Algorithmic Scientists Crypto Engineers 400+ Engineers in different groups in ASTRI

9 Cyber Security Summit 2016

10 Cyber Threat Intelligence Sharing and Analytics Platform GOOGLE TRENDS on Threat Intelligence Reached all time high in 2016

11 ASL-Intel (Cyber Security Daily Intelligence)

12 ASL-Intel (Cyber Security Daily Intelligence) Daily updates on FSI related cyber security intelligence from various dark web, ASTRI Security Lab investigation, and open sources Categorized threat intelligence and analytics

13 ASL-Intel (Cyber Security Daily Intelligence) In depth investigation reports on major cyber threat incidents and hacker techniques

14 ASL-Intel (Cyber Security Daily Intelligence)

15 ASL-Intel (Cyber Security Daily Intelligence)

16 Cyber Range Red vs Blueteam cyber attack and defense Action based practical training vs theory based Attack simulation, war tactics analysis 6,000 cyber attack scenarios, 35,000 pieces of malware DDoS and botnet simulations

17 Cyber Assessment Training and Exam Develop training and exam materials and tools Nurture a rigorous and up to date team of cyber security practitioners Ensure the cyber security resilience of our critical infrastructure

18 Cloud Security Cryptographic Systems big data analytics over encrypted data searchable encryption attribute based encryption for access control homomorphic encryption for encrypted addition and multiplication order preserving encryption for encrypted sorting and range search to be used on the cyber threat intelligence sharing platform, cyber range, banking systems that require geo fencing (compliance)

19 Blockchain Technology EmTech Hong Kong 2016 (MIT) Blockchain Strategies for Business (Cyberport) HKMA Blockchain whitepaper and proof of concept trials Mortgage loan application Trade finance Identity management BOCHK property valuation system HKEx corporate action

20 Blockchain Technology

21 Blockchain: Trade Finance Buyer Seller Commercial Documents Transportation Documents Banking Documents Buyer s Bank Seller s Bank

22 Big Data Analytics + Artificial Intelligence 22

23 Big Data Analytics Team Data Scientists

24 Graph Analytics Suspicious Bitcoin Transactions

25 Graph Analytics Derivatives Transactions Surveillance

26 Predictive Analytics Bank Customer Retention

27 Predictive Analytics Smart Traffic

28 Technology: Chinese Character Recognition using Artificial Intelligence 28

29 Technology: Signature Authentication using Artificial Intelligence

30 Technology: Biometric Authentication + Artificial Intelligence Palm Facial recognition + sentiment Finger print Iris 30

31 Technology: Behavioral Authentication + Artificial Intelligence sensor tactile voice image writing Data encryption ASTRI server Data analytics Machine Learning Authentication

32 Disclaimer The information contained in this presentation is intended solely for your reference and may be subject to change without further notice. Such information's truthfulness, accuracy or completeness is not guaranteed and it may not contain all the material information concerning Hong Kong Applied Science and Technology Research Institute Company Limited and/or its affiliates (collectively, "ASTRI"). ASTRI makes no representation or warranty regarding, and assumes no responsibility or liability for, the truthfulness, accuracy or completeness of any information contained herein. In addition, the information may contain projections and forward-looking statements that may reflect ASTRI s current views with respect to future events and financial performance. These views are based on current assumptions which may change over time. ASTRI makes no assurance that such future events will occur, that such projections will be achieved, or that ASTRI s assumptions are correct. Lastly, this presentation does not constitute an offer made by ASTRI whatsoever (including an offer relating to ASTRI's technologies and/or services). 32

33 End of Presentation Thank you. Corporate website: Contact: Duncan Wong

Launch of the Cybersecurity Fortification Initiative by the HKMA at Cyber Security Summit 2016

Launch of the Cybersecurity Fortification Initiative by the HKMA at Cyber Security Summit 2016 Launch of the Cybersecurity Fortification Initiative by the HKMA at Cyber Security Summit 2016 To further enhance the cyber resilience of the banking sector in Hong Kong, the Hong Kong Monetary Authority

More information

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson

Supply Chain Integrity and Security Assurance for ICT. Mats Nilsson Supply Chain Integrity and Security Assurance for ICT Mats Nilsson The starting point 2 B Internet users 85% Population coverage 5+ B Mobile subscriptions 10 years of Daily upload E-Books surpassing Print

More information

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Technology Risk Management in Banking Industry Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited Change in Threat Landscape 2 Problem & Threats faced by Banking Industry

More information

How Secure is Blockchain? June 6 th, 2017

How Secure is Blockchain? June 6 th, 2017 How Secure is Blockchain? June 6 th, 2017 Before we get started... This is a 60 minute webcast For better viewing experience, close all other applications For better sound quality, please use headphones

More information

Gujarat Forensic Sciences University

Gujarat Forensic Sciences University Gujarat Forensic Sciences University Knowledge Wisdom Fulfilment Cyber Security Consulting Services Secure Software Engineering Infrastructure Security Digital Forensics SDLC Assurance Review & Threat

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Cyber Defense Operations Center

Cyber Defense Operations Center Cyber Defense Operations Center Providing world-class security protection, detection, and response Marek Jedrzejewicz Principal Security Engineering Manager Microsoft Corporation 1 Cybersecurity. In the

More information

May the (IBM) X-Force Be With You

May the (IBM) X-Force Be With You Ann Arbor, Michigan July 23-25 May the (IBM) X-Force Be With You A QUICK PEEK INTO ONE OF THE MOST RENOWNED SECURITY TEAMS IN THE WORLD Marlon Machado Worldwide Standardization Leader, Application Security

More information

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research

More information

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING WWW.HCLTECH.COM 21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING THE AGE OF DISRUPTION: THE AGE OF CYBER THREATS While the digital era has brought with it significant advances in technology, capabilities

More information

Cybersecurity and Data Protection Developments

Cybersecurity and Data Protection Developments Cybersecurity and Data Protection Developments Nathan Taylor March 8, 2017 NY2 786488 MORRISON & FOERSTER LLP 2017 mofo.com Regulatory Themes 2 A Developing Regulatory Environment 2016 2017 March CFPB

More information

HORIZON 2020 WORK PROGRAMME I: INFORMATION AND COMMUNICATION TECHNOLOGIES

HORIZON 2020 WORK PROGRAMME I: INFORMATION AND COMMUNICATION TECHNOLOGIES HORIZON 2020 WORK PROGRAMME 2018-2020 5.I: INFORMATION AND COMMUNICATION TECHNOLOGIES European Commission Decision C(2017)7124 of 27 October 2017 Seite 1 Budget 2018 2019 2020 806.02 Mio 932.82 Mio 955.32

More information

CYBER SOLUTIONS & THREAT INTELLIGENCE

CYBER SOLUTIONS & THREAT INTELLIGENCE CYBER SOLUTIONS & THREAT INTELLIGENCE STRENGTHEN YOUR DEFENSE DarkTower is a global advisory firm focused on security for some of the world s leading organizations. Our security services, along with real-world

More information

Package of initiatives on Cybersecurity

Package of initiatives on Cybersecurity Package of initiatives on Cybersecurity Presentation to Members of the IMCO Committee Claire Bury Deputy Director-General, DG CONNECT Brussels, 12 October 2017 Building EU Resilience to cyber attacks Creating

More information

Advanced Certificate for ECF on Anti-Money Laundering and Counter-Financing of Terrorism (AML / CFT)

Advanced Certificate for ECF on Anti-Money Laundering and Counter-Financing of Terrorism (AML / CFT) Advanced Certificate for ECF on Anti-Money Laundering and Counter-Financing of Terrorism (AML / CFT) # Professional Certificate for ECF on Anti-Money Laundering and Counter- Financing of Terrorism

More information

Towards an integrated regulation platform in Luxembourg. Information Security Education Day th of april

Towards an integrated regulation platform in Luxembourg. Information Security Education Day th of april Towards an integrated regulation platform in Luxembourg Information Security Education Day 2017-28 th of april Context A complex and inter-connected digital ecosystem contributing to all sectors A set

More information

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World CYBER CAMPUS THE CYBER SCHOOL FOR THE REAL WORLD. KPMG BUSINESS SCHOOL The Business School for the Real World In the real world, cyber security applies to all: large firms and small companies, tech experts,

More information

Ambition Market Insights

Ambition Market Insights The second half of 2017 has seen strong hiring activities, driven by a number of key factors, across the technology sector. Many organisations were embracing technology to make their business more efficient

More information

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries Chris Calvert, CISSP, CISM Director of Solutions Innovation Copyright 2013 Hewlett-Packard Development

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

Securing Your Digital Transformation

Securing Your Digital Transformation Securing Your Digital Transformation Security Consulting Managed Security Leveraging experienced, senior experts to help define and communicate risk and security program strategy using real-world data,

More information

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges Do You Have A Firewall Around Your Cloud? California Cybersecurity Education Summit 2018 Tyson Moler Oracle Security, North America Public Sector Conquering The Big Threats & Challenges Real Life Threats

More information

Secure Product Design Lifecycle for Connected Vehicles

Secure Product Design Lifecycle for Connected Vehicles Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards

More information

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person) Cyber Security Presenters: - Brian Everest, Chief Technology Officer, Starport Managed Services - Susan Pawelek, Accountant, Compliance and Registrant Regulation February 13, 2018 (webinar) February 15,

More information

A Risk Management Platform

A Risk Management Platform A Risk Management Platform Michael Lai CISSP, CISA, MBA, MSc, BEng(hons) Territory Manager & Senior Security Sales Engineer Shift to Risk-Based Security OLD MODEL: Prevention-Based Security Prevention

More information

CYBER SECURITY AIR TRANSPORT IT SUMMIT

CYBER SECURITY AIR TRANSPORT IT SUMMIT CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER SECURITY AIR TRANSPORT IT SUMMIT SHARING GOOD PRACTICES VIVIEN EBERHARDT, SITA CYBER SECURITY CYBER

More information

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level Critical Information Infrastructure Protection Role of CIRTs and Cooperation at National Level 1 Global Cybersecurity Agenda (GCA) GCA is designed for cooperation and efficiency, encouraging collaboration

More information

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students

More information

Where Does Your Firm Fall?

Where Does Your Firm Fall? IT Services Where Does Your Firm Fall? 3 Technology Shift in Legal Firm Efficiency Compliance Alternative Competition Cyber Security Workforce Generation Shift Increase Predictability Economics 4 LAWYERS,

More information

Strengthening Capacity in Cyber Talent sans.org/cybertalent

Strengthening Capacity in Cyber Talent sans.org/cybertalent SANS Security Awareness Summit August 4th, 2016 Strengthening Capacity in Cyber Talent sans.org/cybertalent Cybersecurity: The Current State Skills Mismatch Emphasis on theory over practice Education focus

More information

Training on CREST Practitioner Security Analyst (CPSA)

Training on CREST Practitioner Security Analyst (CPSA) 1 Training on CREST Practitioner Security Analyst (CPSA) Objectives This programme introduces to you to the CPSA, CREST Practitioner Security Analyst, and certification. This instructor led course covers

More information

Battle between hackers and machine learning. Alexey Lukatsky Cybersecurity Business Consultant April 03, 2019

Battle between hackers and machine learning. Alexey Lukatsky Cybersecurity Business Consultant April 03, 2019 Battle between hackers and machine learning Alexey Lukatsky Cybersecurity Business Consultant April 03, 2019 Google: facts and numbers Real Cisco Big Data for Security Training Set Why is Machine Learning

More information

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large Executive Summary As a County Government servicing about 1.5 million citizens, we have the utmost responsibility to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

More information

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Cybersecurity THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY Gary Meshell World Wide Leader Financial Services Industry IBM Security March 21 2019 You have been breached; What Happens Next 2 IBM Security

More information

2 nd Year. Module Basket of Courses Duration Credit Offered Status. 12 Weeks 4 NPTEL Programming in Java

2 nd Year. Module Basket of Courses Duration Credit Offered Status. 12 Weeks 4 NPTEL Programming in Java MAULANA ABUL KALAM AZAD UNIVERSITY OF TECHNOLOGY, WEST BENGAL List of Online Courses for 2nd Year, 3rd Year and 4th Year B.Tech Courses of IT and CSE for Additional Credit Earning 2 nd Year Module Basket

More information

ALIENVAULT USM FOR AWS SOLUTION GUIDE

ALIENVAULT USM FOR AWS SOLUTION GUIDE ALIENVAULT USM FOR AWS SOLUTION GUIDE Summary AlienVault Unified Security Management (USM) for AWS is a unified security platform providing threat detection, incident response, and compliance management

More information

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018 Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security BRANDEIS UNIVERSITY PROFESSOR ERICH SCHUMANN MAY 2018 1 Chinese military strategist Sun Tzu: Benchmark If you know your

More information

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise

Disruptive Technologies Legal and Regulatory Aspects. 16 May 2017 Investment Summit - Swiss Gobal Enterprise Disruptive Technologies Legal and Regulatory Aspects 16 May 2017 Investment Summit - Swiss Gobal Enterprise Legal and Regulatory Framework in Switzerland Legal and regulatory Framework: no laws or provisions

More information

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief Publication Date: March 10, 2017 Requirements for Financial Services Companies (23NYCRR 500) Solution Brief EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker s advanced

More information

Managing Microsoft 365 Identity and Access

Managing Microsoft 365 Identity and Access Course MS-500T01-A: Managing Microsoft 365 Identity and Access Page 1 of 3 Managing Microsoft 365 Identity and Access Course MS-500T01-A: 1 day; Instructor-Led Introduction Help protect against credential

More information

zsah Cloud Offering Security FAQ In partnership with Clearswift

zsah Cloud Offering Security FAQ In partnership with Clearswift zsah Cloud Offering Security FAQ In partnership with Clearswift zsah s Cloud Offering Overview zsah Main office and Data Centres Our main office is located in central London with support staff available

More information

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform Fintech District The First Testing Cyber Security Platform In collaboration with CISCO Cloud or On Premise Platform WHAT IS SWASCAN? SWASCAN SERVICES Cloud On premise Web Application Vulnerability Scan

More information

Cybersecurity with Automated Certificate and Password Management for Surveillance

Cybersecurity with Automated Certificate and Password Management for Surveillance Cybersecurity with Automated Certificate and Password Management for Surveillance October 2017 ABSTRACT This reference architecture guide describes the reference architecture of a validated solution to

More information

SFC strengthens internet trading regulatory controls

SFC strengthens internet trading regulatory controls SFC strengthens internet trading regulatory controls November 2017 Internet trading What needs to be done now? For many investors, online and mobile internet trading is now an everyday interaction with

More information

2018 Interim Results Announcement

2018 Interim Results Announcement (Stock Code: 01883) 2018 Interim Results Announcement 16 August 2018 1 1 Results Summary 2 Financial Performance 3 Operational Performance 2 2018 Interim Results Summary Operating profit continue to increase

More information

Information Technology

Information Technology Information Technology Company Profile 2 About Training Solutions Enterprise Solutions Infocan Infocan was established in 1989 with the mission of providing quality, professional, effective and practical

More information

Run the business. Not the risks.

Run the business. Not the risks. Run the business. Not the risks. RISK-RESILIENCE FOR THE DIGITAL BUSINESS Cyber-attacks are a known risk to business. Today, with enterprises becoming pervasively digital, these risks have grown multifold.

More information

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity

Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Securing connected devices and critical IoT infrastructure with Blockchain-enabled Cybersecurity Blockchain-based digital identity for connected devices Locked-down & secured access to critical IoT systems

More information

Security Operations & Analytics Services

Security Operations & Analytics Services Security Operations & Analytics Services www.ecominfotech.biz info@ecominfotech.biz Page 1 Key Challenges Average time to detect an attack (Dwell time) hovers around 175 to 210 days as reported by some

More information

Israel and ICS Cyber Security

Israel and ICS Cyber Security Israel and ICS Cyber Security Dr. Tal Steinherz Chief Technology Office Israel (INCB) 1 October 2015 The INCB The Israeli leads efforts and advises the government on: Cyber Ecosystem Establishing techno-scientific

More information

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities

Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities SESSION ID: SBX3-W1 Cyber, An Evolving Ecosystem: Creating The Road For Tomorrows Smart Cities Gary Hayslip Deputy Director, CISO City of San Diego, CA @ghayslip City of San Diego by the Numbers 11,000+

More information

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities

Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection. IBM Security s Brooke Satti Charles on the Power of These New Capabilities Fighting Fraud with Behavioral Biometrics and Cognitive Fraud Detection IBM Security s Brooke Satti Charles on the Power of These New Capabilities SPONSORED BY As fraudsters continually refine their techniques

More information

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge 2018 Ernst & Young Advisory. All rights reserved. Graphics studio France 1802SG1267. ED 04082018 EY Consulting Is your strategy planning for the future or creating it? #TransformativeAge The better the

More information

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are

6 MILLION AVERAGE PAY. CYBER Security. How many cyber security professionals will be added in 2019? for popular indursty positions are PROGRAM Objective Cyber Security is the most sought after domain, and NASSCOM projects a requirment of over 1 million trained professionals by 2025. Tevel training program is an industry & employability

More information

Customer Security Programme (CSP)

Customer Security Programme (CSP) Customer Security Programme (CSP) ACSDA General Assembly Overview Thomas Trépanier April - 2017 Legal Notices: COPYRIGHT SWIFT 2017 - All rights reserved. You may copy this document within your organisation.

More information

CCISO Blueprint v1. EC-Council

CCISO Blueprint v1. EC-Council CCISO Blueprint v1 EC-Council Categories Topics Covered Weightage 1. Governance (Policy, Legal, & Compliance) & Risk Management 1.1 Define, implement, manage and maintain an information security governance

More information

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018

Security Asia The biggest breaches and cyber-attacks of 2017, and what threats to expect in 2018 Looking Back 2017 2018 Looking Ahead IT industry leaders, experts and analysts share their insights and opinions as they look back at key developments in 2017, as well as technology and market trends they

More information

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE SESSION ID: SBX4W5 SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE Dara Such VP & Publisher, Security Networking and IoT TechTarget @darasuch What we ll cover today State of SecOps:

More information

Put Identity at the Heart of Security

Put Identity at the Heart of Security Put Identity at the Heart of Security Strong Authentication via Hitachi Biometric Technology Tadeusz Woszczyński Country Manager Poland, Hitachi Europe Ltd. 20 September 2017 Financial security in the

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

People risk. Capital risk. Technology risk

People risk. Capital risk. Technology risk Decode secure. People risk Capital risk Technology risk Cybersecurity needs a new battle plan. A better plan that deals with the full spectrum of your company s cybersecurity not just your technology.

More information

Israel: From Start-Up Nation To Cyber-Security Nation

Israel: From Start-Up Nation To Cyber-Security Nation Israel: From Start-Up Nation To Cyber-Security Nation Prepared by Shira Kaplan SIGS Technology Summit Berne, Switzerland Presented by Shira Kaplan SIGS Technology Summit June 23, 2015 Berne, Switzerland

More information

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018 Transformation in Technology Barbara Duck Chief Information Officer Investor Day 2018 Key Takeaways 1Transformation in Technology driving out cost, supporting a more technologyenabled business Our new

More information

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1 CISCO BORDERLESS NETWORKS 2009 Cisco Systems, Inc. All rights reserved. 1 Creating New Business Models The Key Change: Putting the Interaction Where the Customer Is Customer Experience/ Innovation Productivity/

More information

SECURING THE CONNECTED ENTERPRISE.

SECURING THE CONNECTED ENTERPRISE. SECURING THE CONNECTED ENTERPRISE. IT S ONLY A MATTER OF TIME. WILL YOU BE READY? NITISH SHRIVASTAVA DIRECTOR, HARMAN CONNECTED SERVICES EVERYTHING WAS FINE THEN THIS HAPPENED. INTERNET GOES DOWN DAMAGE

More information

Cybersecurity Fortification Initiative (CFI) infrastructure whitepaper

Cybersecurity Fortification Initiative (CFI) infrastructure whitepaper Cybersecurity Fortification Initiative (CFI) infrastructure whitepaper Recently, Cybersecurity Fortification Initiative (CFI) have been a hot topic in the Hong Kong banking industry and financial institutions

More information

ITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape

ITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape ITU- Arab Regional Cyber Security Center s Activities & Regional Threats landscape ENG. BADAR ALI ALSALEHI HEAD OF ITU-ARAB REGIONALCYBER SECURITY CENTER DG OF OMAN NATIONAL CERT Dar es Salaam November

More information

Security by Default: Enabling Transformation Through Cyber Resilience

Security by Default: Enabling Transformation Through Cyber Resilience Security by Default: Enabling Transformation Through Cyber Resilience FIVE Steps TO Better Security Hygiene Solution Guide Introduction Government is undergoing a transformation. The global economic condition,

More information

29-31 OCTOBER cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE

29-31 OCTOBER cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE 29-31 OCTOBER 2019 cyberethicaldays.com THE BEST WAY TO PROMOTE YOUR CYBER SECURITY SOLUTIONS IN EUROPE CYBERSECURITY AND ETHICAL HACKING CONGRESS The Barcelona Cyber Ethical Days Congress will be the

More information

Detect Fraud & Financial Crime

Detect Fraud & Financial Crime IBM i2 Intelligence Analysis Detect Fraud & Financial Crime Acquire Discover Action! Urs Christen Security Sales Government urs.christen@ch.ibm.com 1 IBM Security 2014 IBM Corporation Build an integrated

More information

BUSINESS CONTINUITY MANAGEMENT

BUSINESS CONTINUITY MANAGEMENT BUSINESS CONTINUITY MANAGEMENT 64 th RBAP National Convention & General Membership Meeting 29 30 May 2017 PRESENTATION OUTLINE 2015 Disasters in Numbers 2016 & 2017 Top Business Risks What is BCM? Supervisory

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

nshield GENERAL PURPOSE HARDWARE SECURITY MODULES

nshield GENERAL PURPOSE HARDWARE SECURITY MODULES www.thalesesecurity.com nshield GENERAL PURPOSE HARDWARE SECURITY MODULES Contents 1. SECURITY YOU CAN TRUST 3 2. THE nshield FAMILY 4 3. SUPPORT FOR WIDE VARIETY OF USES 5 4. FEATURES

More information

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001)

CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) CASP CompTIA Advanced Security Practitioner Study Guide: (Exam CAS-001) Gregg, Michael ISBN-13: 9781118083192 Table of Contents Foreword xxi Introduction xxvii Assessment Test xliv Chapter 1 Cryptographic

More information

Cisco Firepower with Radware DDoS Mitigation

Cisco Firepower with Radware DDoS Mitigation Cisco Firepower with Radware DDoS Mitigation Business Decision Maker Presentation Eric Grubel VP Business development, Radware February 2017 DDoS in the news French hosting firm flooded with 1 Tbps traffic

More information

Cybersecurity Session IIA Conference 2018

Cybersecurity Session IIA Conference 2018 www.pwc.com/me Cybersecurity Session IIA Conference 2018 Wael Fattouh Partner PwC Cybersecurity and Technology Risk PwC 2 There are only two types of companies: Those that have been hacked, and those that

More information

Electronic payments in the Netherlands

Electronic payments in the Netherlands Electronic payments in the Netherlands The Dutch approach on Cybersecurity Gijs Boudewijn Deputy General Manager Vienna May 19 th 2015 Agenda Facts and figures Fraud developments in the Netherlands - Situation

More information

Bridging The Gap Between Industry And Academia

Bridging The Gap Between Industry And Academia Bridging The Gap Between Industry And Academia 14 th Annual Security & Compliance Summit Anaheim, CA Dilhan N Rodrigo Managing Director-Smart Grid Information Trust Institute/CREDC University of Illinois

More information

Cybersecurity for Service Providers

Cybersecurity for Service Providers Cybersecurity for Service Providers Alexandro Fernandez, CISSP, CISA, CISM, CEH, ECSA, ISO 27001LA, ISO 27001 LI, ITILv3, COBIT5 Security Advanced Services February 2018 There are two types of companies:

More information

Preserving Data Privacy in the IoT World

Preserving Data Privacy in the IoT World MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu

More information

Cybersecurity. Securely enabling transformation and change

Cybersecurity. Securely enabling transformation and change Cybersecurity Securely enabling transformation and change Contents... Cybersecurity overview Business drivers Cybersecurity strategy and roadmap Cybersecurity in practice CGI s cybersecurity offering Why

More information

Transforming IT: From Silos To Services

Transforming IT: From Silos To Services Transforming IT: From Silos To Services Chuck Hollis Global Marketing CTO EMC Corporation http://chucksblog.emc.com @chuckhollis IT is being transformed. Our world is changing fast New Technologies New

More information

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC Prescriptive Security Operations Centers Leveraging big data capabilities to build next generation SOC Cyber Security Industry in constant renewal in 2016 and 2017 1 Tbps Mirai IoT Botnet broke the Internet

More information

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2, IT Security Training MS-500: Microsoft 365 Security Administration $2,595.00 4 Days Upcoming Dates Course Description Day 1: Managing Microsoft 365 Identity and Access (MS-500T01-A) Help protect against

More information

The Oracle Trust Fabric Securing the Cloud Journey

The Oracle Trust Fabric Securing the Cloud Journey The Oracle Trust Fabric Securing the Cloud Journey Eric Olden Senior Vice President and General Manager Cloud Security and Identity 05.07.2018 Safe Harbor Statement The following is intended to outline

More information

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM

Safeguarding company from cyber-crimes and other technology scams ASSOCHAM www.pwc.com Safeguarding company from cyber-crimes and other technology scams ASSOCHAM Rahul Aggarwal - Director The new digital business ecosystem is complex and highly interconnected The new business

More information

The Great Sensor Debate: The Truth about Smart Cities, from Success to the Dark Side of Automation

The Great Sensor Debate: The Truth about Smart Cities, from Success to the Dark Side of Automation The Great Sensor Debate: The Truth about Smart Cities, from Success to the Dark Side of Automation Steve Surfaro, SIA Public Safety Working Group Christian Morin, VP of Cloud Services (CSO), Genetec Inc.

More information

CYBERTECH MIDWEST Indianapolis, Indiana

CYBERTECH MIDWEST Indianapolis, Indiana MIDWEST KICK-OFF EVENT October 23, 2018 CYBERTECH MIDWEST Indianapolis, Indiana KICK-OFF EVENT: Oct. 23, 2018 JW Marriott Indianapolis CONFERENCE & EXHIBITION: June 2019 MIDWEST KICK-OFF EVENT October

More information

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference Benefits to the Stakeholders A Collaborative and Win-Win Strategy Lal Dias Chief Executive Officer Sri Lanka CERT CC Cyber attacks

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission

More information

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat 2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat Faye Francy Aviation ISAC February 2015 Company Organization Corporate Defense, Space & Security Boeing Capital Corporation

More information

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved. FTA 2017 SEATTLE Cybersecurity and the State Tax Threat Environment 1 Agenda Cybersecurity Trends By the Numbers Attack Trends Defensive Trends State and Local Intelligence What Can You Do? 2 2016: Who

More information

Cyber Security Updates and Trends Affecting the Real Estate Industry

Cyber Security Updates and Trends Affecting the Real Estate Industry Cyber Security Updates and Trends Affecting the Real Estate Industry What, Why, and How? Agenda Cyber Security Today Changes to Security Standards and Trends Protecting Yourself and Your Organization Takeways

More information

Regulatory Update Cyber Security

Regulatory Update Cyber Security Regulatory Update Cyber Security Mr Brian Lee Division Head Hong Kong Monetary Authority 25 September 2015 Disclaimer This presentation is provided for training purposes and does not form part of the formal

More information

Cyber-Physical Chain (CPChain) Light Paper

Cyber-Physical Chain (CPChain) Light Paper Cyber-Physical Chain (CPChain) Light Paper Decentralized Infrastructure for Next Generation Internet of Things Cyber-Physical Chain (CPChain) Team December 10, 2017 Abstract Deeply integrating blockchain

More information

Security in India: Enabling a New Connected Era

Security in India: Enabling a New Connected Era White Paper Security in India: Enabling a New Connected Era India s economy is growing rapidly, and the country is expanding its network infrastructure to support digitization. India s leapfrogging mobile

More information

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016 Bringing cyber to the Board of Directors & C-level and keeping it there Dirk Lybaert, Proximus September 9 th 2016 Dirk Lybaert Chief Group Corporate Affairs We constantly keep people connected to the

More information

COUNTERING IMPROVISED EXPLOSIVE DEVICES

COUNTERING IMPROVISED EXPLOSIVE DEVICES COUNTERING IMPROVISED EXPLOSIVE DEVICES FEBRUARY 26, 2013 COUNTERING IMPROVISED EXPLOSIVE DEVICES Strengthening U.S. Policy Improvised explosive devices (IEDs) remain one of the most accessible weapons

More information

Digital Identity Trends in Banking

Digital Identity Trends in Banking i-sprint Innovations Identity and Security Management Solution Provider Digital Identity Trends in Banking Banking Vietnam 2017 Proven Bank Grade Identity and Security Management Solution Designed, Architected

More information