Larry Clinton Operations Officer Internet Security Alliance 703-907-7028 202-236-0001.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Managing Up Helping leaders 'get' digital March 21, 2013 Lisa Welchman Introduction by Gerry McGovern.
Robert Gregg CEO ID Experts
© 2010 Deloitte & Touche LLP The Cyber-Savvy Organization: 10 Steps to a New Cyber Mission Discipline May 2010.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Information & Communication Technologies NMSU All About Discovery! Risk-Based Information Security Program at NMSU presented by Norma Grijalva.
1 Federal Communications Commission Public Safety and Homeland Security Bureau NARUC Summer Committee Meetings Dallas, Texas July 13, 2014 Clete D. Johnson.
(ISC) Global Information Security Workforce Study (GISWS) Results U.S. Federal Government.
Technology & Talent: Towards A New Paradigm John Cooksey General Manager, HR & Employment Services.
CORPORATE RISK MANAGEMENT & INSURANCE BY R P BLAH D.G.M. INCHARGE THE ORIENTAL INSURANCE COMPANY LIMITED REGIONAL OFFICE BHUBANESWAR.
Corporate Ethics Compliance *
1 The importance of credit bureau and need of legal framework for it LITHUANIA.
Competency Models Impact on Talent Management
By: Dr. Mohammed Alojail College of Computer Sciences & Information Technology 1.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
AN ECONOMIC DEVELOPMENT STRATEGY Business Retention & Expansion WEDA Summer Economic Development Conference – August 18, 2010 Presented by Lisa Johnson,
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Chapter 13: Data Security & Disaster Recovery Database Management Systems.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Larry Clinton President Internet Security Alliance
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
© 2014 WESTERN DIGITAL CORP. ALL RIGHTS RESERVED. Company Confidential Legislative & Regulatory Activities Involving Cyber Security Bob Bowen May 2015.
0 © 2013, Investment Consulting Associates Real estate is a strategic asset. Each and every new location decision carries cost, workforce, and other implications.
1 International Forum on Trade Facilitation May 2003 Trade Facilitation, Security Concerns and the Postal Industry Thomas E. Leavey Director General, UPU.
Leading through Unprecedented Times Managing the 2010 Workforce March 25, 2010.
Joseph Ferracin Director IT Security Solutions Managing Security.
BOTSWANA NATIONAL CYBER SECURITY STRATEGY PROJECT
ADVISORY What do CIOs need for Career Progression? 18 th May 2005 Kumar Parakala, Global Chief Operating Officer, IT Advisory, KPMG 8 May 2007, Sydney,
Australia Cybercrime Capacity Building Conference April 2010 Brunei Darussalam Ms Marcella Hawkes Director, Cyber Security Policy Australian Government.
©UFS Emerging Retirement Model Study: A Survey of Plan Sponsors January 12, 2010 Cynthia Mallett, Vice President, Product & Market Strategies, Corporate.
Eurocom Worldwide Technology Survey 2008 Findings February 2008.
© 2003 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Global Citizenship Walt Rosenberg.
Chapter 4 Copyright © 2011 by Nelson Education Ltd. 1 Prepared by Norm Althouse University of Calgary Prepared by Norm Althouse University of Calgary.
Jerry Cochran Principal Security Strategist Trustworthy Computing Group Microsoft Corporation.
Enterprise Risk Management Chapter One Prepared by: Raval, Fichadia Raval Fichadia John Wiley & Sons, Inc
Data Security in a Mobile World Emmitt Wells – Getronics.
Settling the Frontier: The Convergence and Impact of Privacy and Security Practices Chris Israel Deputy Assistant Secretary for Technology Policy U.S.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
ClearView Value-adding Services for Non-Profit Operations Management Transparency for Understanding, Visibility for Decisions N OT F OR P ROFIT S ERVICES.
What Keeps Your Board Up at Night? Sylvia Kerrigan, Exec. VP, General Counsel & Secretary – Marathon Oil Sean Gorman, Partner – Bracewell & Giuliani.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Athens, Greece May 15, 2005 Global Public Policy.
Department of Industrial Engineering Sharif University of Technology Session # 12.
Kathy Corbiere Service Delivery and Performance Commission
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Security Outsourcing Melissa Karolewski. Overview Introduction Definitions Offshoring MSSP Outsourcing Advice Vendors MSSPs Benefits & Risks Security.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Quantifying Cyber Security Risk in Dollars and Cents to Optimize Budgets CRM008 Speakers: Chris Cooper, VP, Operational Risk Officer; RGA Reinsurance Company.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Board Role In Recognizing, Identifying and Mitigating Risk Constance B
Law Firm Data Security: What In-house Counsel Need to Know
Performing Risk Analysis and Testing: Outsource or In-house
Information Security Program
Lessons from the Field: 7 Steps to Proactive Cybersecurity
National Cyber Intelligence Center
Information Technology Sector
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Internet Security Alliance
National Cyber Strategy Preparedness: 8 Preparatory Questions
The MITRE Corporation Team
Strategy Implementation: Staffing and Directing
Securing the Threats of Tomorrow, Today.
2 OVERVIEW Cybersecurity initiative launched in July 2015 to create a trusted environment to address Cybersecurity -- Focus on the security needs of operators.
What is a Quality Educational Experience?
Managing IT Risk in a digital Transformation AGE
IT and Society Week 2: Privacy.
Discussion Government Private Business Tools for prevention Congress
Presentation transcript:

Larry Clinton Operations Officer Internet Security Alliance

Cyber Security and the Economy The state of Internet security is eroding quickly. Trust in online transactions is evaporating, and it will require strong security leadership for that trust to be restored. For the Internet to remain the juggernaut of commerce and productivity it has become will require more, not less, input from security. PWC Global Cyber Security Survey

Obama: How to link Cyber Security to the Economy If the risks and consequences can be assigned monetary value, organizations will have greater ability and incentive to address cybersecurity. In particular, the private sector often seeks a business case to justify the resource expenditures needed for integrating information and communications system security into corporate risk management and for engaging partnerships to mitigate collective risk. Government can assist by considering incentive-based legislative or regulatory tools to enhance the value proposition and fostering an environment that encourages partnership.” --- President’s Cyber Space Policy Review May 30, 2009 page 18

Where We Are Going “Security seems to be following the trajectory of the quality movement of years ago. With quality, everyone created a VP for quality, but in 10 years the positions were gone or buried. It may be that quality became ingrained and didn’t need its own VP. But the evidence in the survey suggests that security is neither ingrained nor valued” Source PWC Global Info Security Survey

Where We Need to go Security investment must shift from the technology- heavy, tactical operation it has been to date to an intelligence-centric, risk analysis and mitigation philosophy... We have to start addressing the human element of information security, not just the technological one, It's only then that companies will stop being punching bags. Only then will they be able to hit back. PWC Global Cyber Security Survey

What’s Missing We have the technology but still don't have our hands around what's important and what we should be monitoring and protecting. Where's that console that says, 'Hey, credit card numbers are crossing the firewall and this is a PCI issue that has a real business impact?'" PWC Global Cyber Security Survey 2008

What We need to Do “ The security discipline has so far been skewed toward technology—firewalls, ID management, intrusion detection—instead of risk analysis and proactive intelligence gathering. “ PWC Global Cyber Security Survey

Obama: What We Need to Do It is not enough for the information technology workforce to understand the importance of cybersecurity; leaders at all levels of government and industry need to be able to make business and investment decisions based on knowledge of risks and potential impacts. – President’s Cyber Space Policy Review May 30, 2009 page 15

Communicating? Not Really Are security and IT communicating enough with the CEO? By comparing their answers, one finds some startling disconnects... CEOs seem to think their enterprises are a lot more secure (and their employees more reliable) than CIOs and security leaders do.

The Insider Threat This year marks the first time "employees" beat out "hackers" as the most likely source of a security incident. Executives in the security field, with the most visibility into incidents, were even more likely to name employees as the source.

Larry Clinton Operations Officer Internet Security Alliance