Could the BIGGEST Threat to Your Business be INSIDE Your Company?

Similar documents
Sage Data Security Services Directory

Institute of Internal Auditors 2019 CONNECT WITH THE IIA CHICAGO #IIACHI

Professional Training Course - Cybercrime Investigation Body of Knowledge -

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

building a security culture to counter emerging cybersecurity threats

Cybersecurity. Overview. Define Cyber Security Importance of Cyber Security 2017 Cyber Trends Top 10 Cyber Security Controls

Background FAST FACTS

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Cyber Risks in the Boardroom Conference

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

MassMutual Business Continuity Disclosure Statement

Contact us What makes us different Dinesh Anand Our offices Forensic Bangalore Kolkata Cutting-edge technology to deliver more efficiently Services

Defense in Depth Security in the Enterprise

Security in Today s Insecure World for SecureTokyo

Driving Global Resilience

DUNS CAGE 5T5C3

Cybersecurity in Higher Ed

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Operations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ

STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

NERC Staff Organization Chart Budget 2018

Digital Service Management (DSM)

CYBER SECURITY TRAINING

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Give Me 5 Understanding Cyber Security Part 1: How Cyber Security is Impacting Your Business

Personnel Certification

SOC for cybersecurity

Background FAST FACTS

Information Security Incident Response Plan

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

CERTIFIED IN THE GOVERNANCE OF ENTERPRISE IT CGEIT AFFIRM YOUR STRATEGIC VALUE AND CAREER SUCCESS

NERC Staff Organization Chart Budget 2017

Security and Privacy Governance Program Guidelines

CYBER CAMPUS KPMG BUSINESS SCHOOL THE CYBER SCHOOL FOR THE REAL WORLD. The Business School for the Real World

TIPS FOR FORGING A BETTER WORKING RELATIONSHIP BETWEEN COUNSEL AND IT TO IMPROVE CYBER-RESPONSE

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Modern slavery and human trafficking statement 2017

The ACFE Law Enforcement and Government Alliance

ISACA GEEK WEEK SECURITY MANAGEMENT TO ENTERPRISE RISK MANAGEMENT USING THE ISO FRAMEWORK AUGUST 19, 2015

The Impact of Cybersecurity, Data Privacy and Social Media

NERC Staff Organization Chart Budget 2017

Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

A CFO s Guide to Cyber Security in the Coming Year

Cyber Security Strategy

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Larry Clinton President & CEO Internet Security Alliance

Defensible and Beyond

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

ITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018

SALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually

Department of Homeland Security Updates

locuz.com SOC Services

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Altius IT Policy Collection Compliance and Standards Matrix

2014 NETWORK SECURITY & CYBER RISK MANAGEMENT:

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

NERC Staff Organization Chart Budget 2019

A Global Look at IT Audit Best Practices

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

A Safer World. A Secure Tomorrow. SECURITY AUDITS CONSULTANCY TRAINING.

Information Security Incident Response Plan

Cyber Crime Seminar 8 December 2015

Building Automation & Control System Vulnerabilities

COUNTERING IMPROVISED EXPLOSIVE DEVICES

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Best Practices for Campus Security. January 26, 2017

Audit and Compliance Committee - Agenda

A new approach to Cyber Security

ASBO International. SFO Certification: Creating Your Career Pathway

Guelph Police Service

Steps to Take Now to be Ready if Your Organization is Breached Thursday, February 22 2:30 p.m. 3:30 p.m.

Why you MUST protect your customer data

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Altius IT Policy Collection Compliance and Standards Matrix

G7 Bar Associations and Councils

NERC Staff Organization Chart Budget 2019

Is your privacy secure? HIPAA Compliance Workshop September Presented by: Andrés Castañeda, Senior Manager Steve Nouss, Partner

2/6/2014. Uncommon Times. The Impact on Students. ASBO International. SFO Certification: Creating Your Career Pathway

Disaster Recovery and Business Continuity Planning (Mile2)

Les joies et les peines de la transformation numérique

Evaluating Cybersecurity Coverage A Maturity Model. Presented to: ISACA Charlotte Chapter Vision for IT Audit 2020 Symposium

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

Securing Industrial Control Systems

Cyber-Threats and Countermeasures in Financial Sector

The National Network of Fusion Center: Where We Have Been and Where We are Going

Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure

PCI Compliance Simplified A Case of Airport Parking System PCI Readiness

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Security Awareness Training Courses

Cybersecurity. Securely enabling transformation and change

Changing the Game: An HPR Approach to Cyber CRM007

The Office of Infrastructure Protection

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

2017 RIMS CYBER SURVEY

Transcription:

Could the BIGGEST Threat to Your Business be INSIDE Your Company? Presented By: Cheryl W. Snead, Banneker Industries, Inc. Rick Avery, Securitas Security Inc.

Cheryl W. Snead President/CEO/Facility Security Officer Banneker Industries, Inc. 582 Great Road, Ste. 101 N. Smithfield, RI 02896 401.534.0027 office c_snead@banneker.com As the company s founder in 1991, Banneker Industries, Inc. is a world-class provider of Supply Chain Management solutions, including 3 rd & 4 th Party Logistics, supplier management, kitting, warehousing and distribution. Headquartered in North Smithfield, Banneker also has operations at Quonset Point in Rhode Island, as well as California, Virginia and Alabama. As Facility Security Officer (FSO), Cheryl is responsible for the personnel & facility security as well as overall Security Program Management for the company. Ms. Snead also serves on the Board of Directors of Amica Insurance Company and the Board of Trustees of Bryant University, engaged in the development and execution of their Global Supply Chain Management Program.

Richard K. Avery, CPP President Northeast Region Securitas Security Services USA, Inc. One Harbor Street, Suite 301 Boston, MA 02210 rick.avery@securitasinc.com Rick brings almost forty years of demonstrated security and management expertise to his position of Region President, Securitas USA. He began his career with First Security Services Corporation in 1975 as a security officer and over the last three decades Rick assumed progressively more responsible positions across the organization, including investigations and human resources as well as operational and business unit management. His strategic and innovative executive leadership has led to the progressive growth and development of this market, ensuring Securitas continued position as industry and market leader in this region of 14,000 employees. As a member of the American Society for Industrial Security for 36 years, Rick has been honored to hold leadership positions in the Boston Chapter including Chapter Chairman, Vice Chairman, Program Chairman, Secretary, and holds board certification as a Certified Protection Professional, the security profession s highest recognition of practitioners. He is a member of the Building Owners and Managers Association (BOMA), High Tech Crime Association (HTCIA), The International Association of Venue Managers (IAVM) and the National Fire Protection Association He is a frequently sought source of expert commentary and has appeared as an expert commentator for television and radio media outlets.

Agenda (50 Minutes) Opening Remarks 1. Insider Threat 2. Cyber-Security 3. Global Supply Chain General Q&A Closing Remarks

Insider Threat: Did You Know? 1. Average cost per incident is $412,000 2. Average loss per industry is $15M over 10 yrs. 3. In several instances damages reached over $1B 4. Criminals who executed low and slow approach accomplished more damage and escaped detection for longer periods. 5. Fraud committed by managers consistently caused more actual damage ($200,105 ave.) then fraud committed by non-managers ($112,188 ave.)

Insider Threat Combatants 1. Incorporating an Insider Threat Program within your company Enterprise Risk Management Program 1. Employee Hiring, Awareness & Accountability Personnel Screening is Critical! Continued Education and Awareness Briefings (Classified & Unclassified) Encourage Reporting Suspicious Activity(s), etc. 2. Deterrents: Physical Security CCTV, Monitoring Systems, Authorized Areas, etc. Transport Truck Seals, GPS Tracking, Random Following, etc. Process Checks & Balances Policies & Procedures, Internal/External Audits, 3 rd Party Detectives/Security Personnel

Brief Topic Discussion

Cyber Security-Did You Know? 1. Cyber-Security costs over $110B Annually: China ranked first at $46B and the U.S. second at $21B 2. 49% of security breaches at Federal Agencies are caused by employees by passing security measures Surfing the web; accessing emails and downloading files 3. 31% of employees work around IT security measures at least once/week 2/3 of IT users believe security protocols are burdensome and time-consuming 4. 74% are unprepared for an international cyber attack

Cyber Security-Did You Know? 5. Last year travelers left 8,016 mobile devices at 7 of the largest airports in the U.S: Smartphones & Tablets 3,444 (43%) Laptops 3,576 (44.6%) USB Drives 996 (12.4%) 6. 62% Smartphone Users Don t lock their devices with a passcode Do You?

Cyber-Security Combatants 1. Employee IT Awareness & Training 2. System/Internet/Email Firewalls and Monitoring Blind Penetration Testing 3. Social Media Policies and Monitoring

Brief Topic Discussion

Global Supply Chain-Did You Know? 1. 80% of corporate losses due to theft occur within the Supply Chain, yet on average supply chain security spending is less than 5% of a firm s security budget 2. Global connectivity can compromise an organization and its entire Supply Chain Cyber-Security 3. In a survey of 108 Global 2000 companies, it was concluded corporate ethics and compliance programs and controls do not extend to their global supply chains 86% of respondents concede that their primary ethics code does not address the conduct of suppliers 59% of respondents do not include suppliers in their analysis when assessing their company s own ethics and compliance risks 4. Trade Secrets are shared through American Experiences Trade Shows & Conferences, Academic Settings/Events where showing your knowledge and expertise is acceptable

Global Supply Chain Combatants 1. Know Your Partners Domestic & Abroad Be wary of those seeking more information than you are comfortable sharing 2. Establish Policies and Procedures but Audit them yourself for effectiveness US Laws don t carry weight overseas Surprise Audits (1-2 levels down) are BEST!

Brief Topic Discussion

Agenda (50 Minutes) Opening Remarks 1. Insider Threat 2. Cyber-Security 3. Global Supply Chain General Q&A Closing Remarks

Thank You!!! Cheryl W. Snead President/CEO/Facility Security Officer Banneker Industries, Inc. 582 Great Road, Ste. 101 N. Smithfield, RI 02896 401.534.0027 office c_snead@banneker.com Richard K. Avery, CPP President Northeast Region Securitas Security Services USA, Inc. One Harbor Street, Suite 301 Boston, MA 02210 rick.avery@securitasinc.com