Cybersecurity, Trade, and Economic Development

Similar documents
Commonwealth Cyber Declaration

THE ACCENTURE CYBER DEFENSE SOLUTION

RESOLUTION 130 (REV. BUSAN, 2014)

WORKSHOP CYBER SECURITY AND CYBERCRIME POLICIES FOR AFRICAN DIPLOMATS. Okechukwu Emmanuel Ibe

COMESA CYBER SECURITY PROGRAM KHARTOUM, SUDAN

The UK s National Cyber Security Strategy

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Robert Hayes Senior Director Microsoft Global Cyber Security & Data Protection Group

Combating Cyber Risk in the Supply Chain

Innovate or die!? Modern IT Workplace Security. Alex Verboon Cyber Security Consultant

REGIONAL WORKSHOP ON E-COMMERCE LEGISLATION HARMONIZATION IN THE CARIBBEAN COMBATING CYBERCRIME: TOOLS AND CAPACITY BUILDING FOR EMERGING ECONOMIES

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

ENISA & Cybersecurity. Dr. Udo Helmbrecht Executive Director, European Network & Information Security Agency (ENISA) 25 October 2010

Cyber Security Technologies

Framework for Improving Critical Infrastructure Cybersecurity. and Risk Approach

Angela McKay Director, Government Security Policy and Strategy Microsoft

Securing Your Digital Transformation

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

The challenges of the NIS directive from the viewpoint of the Vienna Hospital Association

Tracy Hackshaw, Chair, Internet Society Trinidad & Tobago Chapter 2 October 2018 Commonwealth ICT Forum 2018 Port of Spain, Trinidad & Tobago

New Zealand National Cyber Security Centre Incident Summary

Cybersecurity Fundamentals

Systemic Analyser in Network Threats

Implementation Strategy for Cybersecurity Workshop ITU 2016

Itu regional workshop

Building a Threat Intelligence Program

Cyber Security Roadmap

Cybersecurity for ALL

Media Kit. California Cybersecurity Institute

Are you safe? Your business growth strategies are at the heart of the cyber risks your organization faces

Position Description. Computer Network Defence (CND) Analyst. GCSB mission and values. Our mission. Our values UNCLASSIFIED

Cybersecurity & Digital Privacy in the Energy sector

Global Cybersecurity Agenda

Welcome to the CyberSecure My Business Webinar Series We will begin promptly at 2pm EDT All speakers will be muted until that time

Resolution adopted by the General Assembly on 21 December [on the report of the Second Committee (A/64/422/Add.3)]

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

CONE 2019 Project Proposal on Cybersecurity

MANAGING CYBER RISK: THE HUMAN ELEMENTS OF CYBERSECURITY

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

G7 Bar Associations and Councils

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Security Takes Center Stage

Understanding the Changing Cybersecurity Problem

Gujarat Forensic Sciences University

INFORMATION. October Radisson Blu Hotel Abidjan PRESS RELEASE.

Cybersecurity, safety and resilience - Airline perspective

Reducing Cybersecurity Costs & Risk through Automation Technologies

Transport and ICT Global Practice Smart Connections for All Sandra Sargent, Senior Operations Officer, Transport & ICT GP, The World Bank

World Telecommunication Development Conference (WTDC- 14) Dubai, 30 March 10 April 2014

THE POWER OF TECH-SAVVY BOARDS:

RESOLUTION 130 (Rev. Antalya, 2006)

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Commonwealth Telecommunications Organisation Proposal for IGF Open Forum 2017

Ms. Izumi Nakamitsu High Representative for Disarmament Affairs United Nations

FSOR. Cyber security in the financial sector VISION 2020 FINANCIAL SECTOR FORUM FOR OPERATIONAL RESILIENCE

NEW INNOVATIONS NEED FOR NEW LAW ENFORCEMENT CAPABILITIES

2017/SOM3/DIA/007 Digital Trade Building Blocks

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

Cybersecurity. Securely enabling transformation and change

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Package of initiatives on Cybersecurity

CHAIR S SUMMARY: G7 ENERGY MINISTERS MEETING

CYBERCRIME AS A NEW FORM OF CONTEMPORARY CRIME

PA TechCon. Cyber Wargaming: You ve been breached: Now what? April 26, 2016

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

New Partners Join Charter of Trust to Protect Critical Infrastructure

CYBER SOLUTIONS & THREAT INTELLIGENCE

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

National Policy and Guiding Principles

19-20 September 2018 The Trans Resort Kuta, Bali - Indonesia

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Cybersecurity Risk Management:

Provisional Translation

A Modern Framework for Network Security in Government

Cybersafety Culture Assessment

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

Advanced Technology Academic Research Council Federal CISO Summit. Ms. Thérèse Firmin

Protecting the Nation s Critical Assets in the 21st Century

Cyber Risk for Maritime

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Cyber Security and Cyber Fraud

Department of Homeland Security Updates

Netherlands Cyber Security Strategy. Michel van Leeuwen Head of Cyber Security Policy Ministry of Security and Justice

Nokia Conference Call 1Q 2012 Financial Results

CYBER RESILIENCE & INCIDENT RESPONSE

Securing Digital Transformation

Cyber Espionage A proactive approach to cyber security

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

13967/16 MK/mj 1 DG D 2B

The Credential Phishing Handbook. Why It Still Works and 4 Steps to Prevent It

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Rocky Mountain Cyberspace Symposium 2018 DoD Cyber Resiliency

Changing the Game: An HPR Approach to Cyber CRM007

Cyber Security Strategy

CONTEMPORARY CYBER ATTACK TRENDS AND CHALLENGES DR SHASHWAT RAIZADA

Cyber Security Maturity Model

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Transcription:

Cybersecurity, Trade, and Economic Development G7 ICT Priorities: Technology, Innovation, and the Global Economy UNCTAD E-Commerce Week Danielle Kriz Senior Director, Global Policy Palo Alto Networks April 18, 2016

Delivering the next-generation security platform 2 2015, Palo Alto Networks. Confidential and Proprietary.

Palo Alto Networks at-a-glance CORPORATE HIGHLIGHTS REVENUES ENTERPRISE CUSTOMERS Founded in 2005; first customer shipment in 2007 Safely enabling applications and preventing cyber threats Able to address all enterprise cybersecurity needs Exceptional ability to support global customers Experienced team of 3,300+ employees Q2 FY16: $334.7M revenue $1,000 $800 $600 $400 $200 $0 $MM $928 $598 $396 $255 $119 $13 $49 FY09 FY10 FY11 FY12 FY13 FY14 FY15 24,000 20,000 16,000 12,000 8,000 4,000 0 26,000 19,000 13,500 9,000 4,700 Jul-11 Jul-12 Jul-13 Jul-14 Jul-15 3 2015, Palo Alto Networks. Confidential and Proprietary.

G7 Recommendation- Cybersecurity The G7 can demonstrate global leadership on ICT priorities if it agrees on the following outcomes in 2016: Cybersecurity. Ensuring that measures they take to enhance cybersecurity reflect the global nature of cyberspace, rely on risk management-based approaches that avoid prescribed standards for individual technologies, and incorporate meaningful consultation with the private sector to encourage innovative, flexible, and cost-effective solutions. Why is this approach important? 4 2016, Palo Alto Networks. Confidential and Proprietary.

Cybersecurity measures should reflect the global nature of cyberspace Cyberspace is global Global Internet technologies must interconnect Companies need to work online across borders People need to communicate across borders (using an iphone in Switzerland to call a friend on an Android phone in Mozambique) Threats are global Cyber criminals do not respect national borders Threats cross borders in real time Countries (their businesses and citizens) face many of the same threats Security measures must also be global 5 2016, Palo Alto Networks. Confidential and Proprietary.

Cybersecurity measures should rely on risk management-based approaches Organizations often have different risks from each other Can depend on their industry, location, sophistication, size, and assets They may have different things of value that criminals want They could be targeted for other reasons (e.g. political reasons) They use various technologies, infrastructure, applications And these risks change over time Items of value change Companies enter new lines of business, get new customers or partners Cyber criminals change tactics Technologies change 6 2016, Palo Alto Networks. Confidential and Proprietary.

Cybersecurity measures should incorporate meaningful consultation with the private sector Expertise exists everywhere Knowledge about threats, technologies- much of this is in private industry Governments and the private sector have the same goal: better cybersecurity and resilience Governments want to protect their citizens, businesses, and economies Companies want to conduct business securely, protect their IP, and protect their customers data In many countries, private companies own or operate critical infrastructure Companies have significant experience with cybersecurity 7 2016, Palo Alto Networks. Confidential and Proprietary.

CYBERSECURITY IS A COMPLEX POLICY ISSUE 8 2015, Palo Alto Networks. Confidential and Proprietary.

What s changed? THE EVOLUTION OF THE ATTACKER CYBERCRIME NOW US$445 billion industry CYBER WARFARE 100+ nations 9 2015, Palo Alto Networks. Confidential and Proprietary.

Organizational risk What s changed? THE EVOLUTION OF THE ATTACK Mobility threat Identity compromise Zero-day exploits / vulnerabilities Unknown & polymorphic malware Evasive command-and-control Known threats 4 2015, Palo Alto Networks. Confidential and Proprietary.

Economics of Attackers: Prevention Challenge Source: Ponemon Institute Increase in adversary skills and use of specialized tools Innovation driving improved attack toolkits Increase in number of vulnerabilities & exploits Increased volume of successful attacks Decreased costs of launching attack 11 2016, Palo Alto Networks. Confidential and Proprietary.

HANK YOU! dkriz@paloaltonetworks.com www.paloaltonetworks.com +1-571-266-5647 12 2016, Palo Alto Networks. Confidential and Proprietary.