Cybersecurity Boardroom Workshop 2015, How Boards of Directors and CXOs Can Build the Proper Foundation to Address Today's Information Security Challenges
Cloud Computing, Cyber Security, Data Breach, Education, IT Security, Technology

How Boards of Directors and CXOs Can Address Today’s Information Security Challenges at Cybersecurity Boardroom Workshop 2015

Cybersecurity Boardroom Workshop 2015, How Boards of Directors and CXOs Can Build the Proper Foundation to Address Today's Information Security Challenges

Cybersecurity Boardroom Workshop 2015

In the days prior to Thanksgiving 2013, malware designed to steal credit card data at Target was surreptitiously installed. According to Bloomberg BusinessWeek, the company had installed a malware detection tool. Target had specialists in Bangalore to monitor its computers around the clock. Two days after Thanksgiving, the malware was spotted. The team in India got an alert and flagged Target’s security managers. And then?

Nothing happened. Target’s alert system had worked effectively. But then, Target stood by as 40 million credit card numbers flowed out of its computers. Only a few months later, CEO Gregg Steinhafel and CIO Beth Jacob were both out of the company.

Cybersecurity has become widely recognized as a critical corporate challenge. Boards and senior managements are putting it on their agenda, categorizing cybersecurity not as a compartmentalized risk for the information technology team, but as strategic and enterprise-wide.

However, a security program is only as strong as its weakest link. While a survey by the Institute of Internal Auditors found 58% of board members felt they should be actively involved in cybersecurity preparedness, only 14% said they were actively involved. Unfortunately, 65% also said their perception of the risk their organizations faced had increased.

Board members and senior managers need to become more educated about the topic to be able to ask questions that are strategic yet granular enough to address company-specifics. To go further, it will be imperative to join Cybersecurity Boardroom Workshop 2015, the first seminar targeted at strategic and executive leaders for whom cybersecurity readiness is a relatively new yet critically important area to be intelligently conversant about.

Cybersecurity Boardroom Workshop 2015 is specifically designed for board members and senior executives of public and private firms looking for new ways to gain and maintain competitive business advantage. Business executives with responsibility for IT, finance, compliance, risk management and procurement as well as entrepreneurs and innovators are welcome.

By the end of Cybersecurity Boardroom Workshop 2015, to be held in Dubai, March 8-9, Hong Kong, March 12-13, Seoul, March 19-20, Singapore, March 26-27, London, 9-10 April, and New York City, April 16-17, participants will:

  • Understand enterprise cybersecurity and the impact on shareholder value in the short and long term
  • Identify immediate security needs for the organization with actionable steps for senior management
  • Learn how to identify current and future challenges to better enable management to focus on threat reduction and operational reliability
  • Get up to speed on international and domestic approaches and frameworks for effective cybersecurity practices corporate wide

DAY 1: UNDERSTANDING THE CYBER WORLD

Understanding Cybersecurity

  • The trillion dollar global cyber risk environment
  • The enterprise-wide challenge of protecting the organization’s assets
  • The impact of cybersecurity attacks on shareholder value
  • Identity theft and the legal implications of data breaches

Social Engineering: The “Weakest Human Link” in Cybersecurity

  • The responsibility for cybersecurity in the organization
  • Assessing the quality of the cybersecurity workforce
  • Evaluating shortcomings in meeting cybersecurity workforce standards
  • Assessing the effectiveness of current professionalization tools

Understanding the Cybersecurity Testing Method

  • Reconnaissance: How to use tools to find vulnerable systems and devices
  • Packet sniffing: How to gather information from computer systems
  • Port scanning: How port information is exposed on computer systems
  • Password policy and cracking: What to consider when developing password policy
  • Vulnerability: How to reduce attacks by enforcing proactive compliance policies

Basics of Security Architecture for Board Members and CXOs

  • How architecture defines the structure of a system and makes it explicit
  • The fundamentals of layered architecture: presentation, business, data, and service layers
  • How the current computer network infrastructure was not designed originally to be secure
  • Embedding architecting security into systems from inception

DAY 2: RESPONDING TO THE CYBERSECURITY CHALLENGE

Introduction to NIST’s Cybersecurity Framework

  • Describing the enterprise’s current and target cybersecurity posture
  • Identifying and prioritizing opportunities for improvement
  • Assessing and accelerating progress toward the target state
  • Communicating with internal and external stakeholders about cybersecurity risk

The Five Core Functions of NIST’s Cybersecurity Framework

  • Identify: Organizational understanding to manage cybersecurity risk
  • Protect: Safeguards to ensure delivery of critical infrastructure services
  • Detect: How to identify the occurrence of a cybersecurity event
  • Respond: Taking action regarding a detected cybersecurity event
  • Recover: Maintaining plans for resilience and to restore any impaired capabilities

Introduction to Intelligence-driven Cyber Network Defenses

  • How investigations are based upon the scientific method: observing, hypothesis, evaluation, prediction and validation
  • How to leverage cutting edge technology, vigilant people and innovative processes
  • How to continuously improve the enterprise process for defending IT assets
  • How to empower people to resolve the problem with guidance and mentoring

Establishing or Improving a Cybersecurity Program

  • Prioritize and scope: Identifying business/mission objectives and high-level priorities
  • Orient: Identifying related systems and assets, regulatory requirements, and risk approach
  • Create a current profile: Developing a profile by indicating current degree of preparedness
  • Conduct a risk assessment: Analyzing the operational environment in order to discern the likelihood of an attack
  • Create a target profile: Describing the organization’s desired cybersecurity outcomes
  • Determine, analyze, and prioritize gaps: Determining gaps between current and target profiles
  • Implement action plan: Deciding which actions to take in regards to identified gaps

Cybersecurity Boardroom Workshop 2015 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Standard
The Speed Traders and Knightmare on Wall Street's Edgar Perez
Cyber Security, Cybersecurity, Data Breach, Finance, IT Security, Security, Technology

What Consumers and Investors can Learn from Morgan Stanley and Sony’s Data Breaches with The Speed Traders and Knightmare on Wall Street’s Edgar Perez at Golden Networking’s Cyber Security World Conference 2015 New York City

Morgan Stanley joined a growing list of prominent corporate brands to suffer a data breach, after it revealed one of his financial advisors stole the information of as many as 350,000 wealth management clients, and that some of the data was posted online for sale. The event reminds consumers and investors of the ever-evolving and ubiquitous threat of data breaches.

Many other large companies including Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, JPMorgan Chase, Nasdaq OMX, Neiman Marcus, Sony, Target and Wal-mart had suffered high-profile cyber security breaches. It is not beyond the realm of possibilities to think that today the information of every American has already been compromised in any of these publicly disclosed attacks.

The Speed Traders and Knightmare on Wall Street's Edgar Perez

The Speed Traders and Knightmare on Wall Street’s Edgar Perez

Amidst these pressing challenges, Edgar Perez, author of Knightmare on Wall Street, will discuss what consumers and investors can learn from recent cybersecurity incidents in the United States at Cyber Security World Conference 2015 New York City. The forum will provide a platform for information security authorities and innovative service providers to distil their latest research for hundreds of senior executives focused on protecting enterprise and government valuable assets. Cyber security experts will discuss subjects such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Mr. Perez has been engaged to present at the Council on Foreign Relations, Vadym Hetman Kyiv National Economic University (Kiev), U.S. Securities and Exchange Commission (Washington DC), Quant Investment & HFT Summit APAC 2012 (Shanghai), CFA Singapore, Hong Kong Securities Institute, Courant Institute of Mathematical Sciences at New York University, University of International Business and Economics (Beijing), Hult International Business School (London and Shanghai) and Pace University (New York), among other public and private institutions.

Mr. Perez is widely regarded as the preeminent global expert in technology and investing. He is the author of Knightmare on Wall Street and The Speed Traders and has been interviewed on CNN, CNBC, FOX BUSINESS, Bloomberg TV, CNN en Español, CCTV China, BNN, Bankier.pl, Leaderonomics, TheStreet.com, GPW Media, Channel NewsAsia’s Business Tonight and Cents & Sensibilities. Mr. Perez has been globally featured on FXFactor, Columbia Business, OpenMarkets, Sohu, News.Sina.com, Yicai, eastmoney, Caijing, ETF88.com, 360doc, AH Radio, CNFOL.com, CITICS Futures, Tongxin Securities, ZhiCheng.com, CBNweek.com, Caixin, Futures Daily, Xinhua, CBN Newswire, Chinese Financial News, ifeng.com, International Finance News, hexun.com, Finance.QQ.com, Finance.Sina.com, The Korea Times, The Korea Herald, The Star, The Malaysian Insider, BMF 89.9, iMoney Hong Kong, CNBC, Bloomberg Hedge Fund Brief, The Wall Street Journal, The New York Times, Dallas Morning News, Valor Econômico, FIXGlobal Trading, TODAY Online, Oriental Daily News and Business Times.

Mr. Perez was a vice president at Citigroup, a senior consultant at IBM, and a strategy consultant at McKinsey & Company in New York City. Mr. Perez has an undergraduate degree from Universidad Nacional de Ingeniería in Lima, Peru (1994), a Master of Administration from Universidad ESAN in Lima, Peru (1997) and a Master of Business Administration from Columbia Business School in New York, with a dual major in Finance and Management (2002). He belongs to the Beta Gamma Sigma honor society. Mr. Perez resides in the New York City area and is an accomplished salsa and hustle dancer.

About Cyber Security World Conference 2015

Renowned information security experts and innovative service providers will present at Cyber Security World Conference 2015 their latest thinking to hundreds of senior executives focused on protecting enterprises and governmental agencies. Topics that Cyber Security World Conference 2015 will discuss include:

  • Cyber Security Megatrends Security Professionals can’t Ignore Today
  • Strengthening the Security of Industry-wide Technology Infrastructure
  • How Hackers Really Operate to Obtain Financial Data
  • Cyber Security and its Role in the Overall Security of the United States
  • Key Considerations about Security in the Internet of Things Age
  • Designing and Managing Effective Information Security Programs

Cyber Security World Conference 2015 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Standard
Cloud Computing, Cyber Security, Defense, Finance, IT Security, Security, Technology

Neglected Server Provided Entry for JPMorgan Hackers

According to New York Times, the computer breach at JPMorgan Chase this summer — the largest intrusion of an American bank to date — might have been thwarted if the bank had installed a simple security fix to an overlooked server in its vast network, said people who have been briefed on internal and outside investigations into the attack.

A hack attack affected JPMorgan Chase this summer.

Big corporations like JPMorgan spend millions — $250 million in the bank’s case — on computer security every year to guard against increasingly sophisticated attacks like the one on Sony Pictures. But the weak spot at JPMorgan appears to have been a very basic one, the people said. They did not want to be identified publicly because the investigation into the attack is incomplete.

The attack against the bank began last spring, after hackers stole the login credentials for a JPMorgan employee, these people said. Still, the attack could have been stopped there.

Read More

Standard
Business, Cyber Security, Defense, Finance, IT Security, Security, Technology

Neglected Server Provided Entry for JPMorgan Hackers

The computer breach at JPMorgan Chase this summer — the largest intrusion of an American bank to date — might have been thwarted if the bank had installed a simple security fix to an overlooked server in its vast network, said people who have been briefed on internal and outside investigations into the attack.

A hack attack affected JPMorgan Chase this summer.

Big corporations like JPMorgan spend millions — $250 million in the bank’s case — on computer security every year to guard against increasingly sophisticated attacks like the one on Sony Pictures. But the weak spot at JPMorgan appears to have been a very basic one, the people said. They did not want to be identified publicly because the investigation into the attack is incomplete.

The attack against the bank began last spring, after hackers stole the login credentials for a JPMorgan employee, these people said. Still, the attack could have been stopped there.

Read More

Standard
Cloud Computing, Cyber Security, cyber security legislation, Cybersecurity, IT Security, Security

Home Depot, Target, and now JPMorgan Chase: Hacking of 76 Million Households Makes it the Largest Intrusion Ever

According to The New York Times, a cyberattack this summer on JPMorgan Chase compromised the accounts of 76 million households and seven million small businesses, a tally that dwarfs previous estimates by the bank and puts the intrusion among the largest ever.

The Manhattan headquarters of JPMorgan Chase, which securities filings revealed was attacked by hackers over the summer.

Cyber Security World Conference 2015 New York City

The details of the breach — disclosed in a securities filling  on Thursday, October,2014 — emerge at a time when consumer confidence in the digital operations of corporate America has already been shaken.Target, Home Depot and a number of other retailers have sustained major data breaches. Last year, the information of 40 million cardholders and 70 million others were compromised at Target, while an attack at Home Depot in September affected 56 million cards.

But unlike retailers, JPMorgan, as the largest bank in the nation, has financial information in its computer systems that goes beyond customers’ credit card details and potentially includes more sensitive data.

Read More

Standard
Business, Cyber Security, cyber security legislation, Defense, Finance, IT Security, Security, Technology

Hacking the banks Who lies behind the latest cyber attacks on JPMorgan Chase?

ROBBING a bank used to require a gun and a getaway car. Now hackers can attack financial institutions with a few clicks of a computer mouse. According to reports on August 27th from Bloomberg, America’s Federal Bureau of Investigation (FBI) is now investigating a series of cyber-intrusions at several American banks, including JPMorgan Chase, one of the biggest.

The attackers are said to have siphoned off large amounts of data, including customers’ bank-account details. Quite what their motive is remains a mystery. One theory is that the attacks are the work of Russian hackers retaliating against international sanctions imposed as a result of Russia’s involvement in the ongoing conflict in Ukraine. Another suggests that they are the work of criminals trying to profit from the data they pilfer.

The notion that this is a form of retaliation is hard to take seriously. There are more spectacular and well-tested ways to generate publicity for a cause, such as launching denial of service attacks, which involve directing large amounts of web traffic at banks’ sites in order to slow them down or knock them offline. Over the past few years big American banks have faced repeated volleys of such attacks, which have grown in intensity.

Read More

Standard
Business, Cloud Computing, Cyber Security, Cybersecurity, Defense, Finance, Government, IT Security, Security, Technology

Golden Networking’s Cyber Security World Conference 2015 New York City to Strategize Sony’s Agenda Beyond North Korean Cyber Attack and The Interview

Cyber Security World Conference 2015 New York City

Cyber Security World Conference 2015 New York City

Headlines in recent weeks have been consumed with the news of a cyberattack that targeted Sony’s movie studio as it geared to release The Interview, film that describes a CIA attempt to assassinate North Korean leader Kim Jong- un.

The company now could face tens of millions of dollars in costs from the massive computer hack that hobbled its operations for days. Major costs include investigations into what happened, computer repairs or replacements, and steps to prevent a future attack. Lost productivity while operations were disrupted will add to the price tag.

The attack, believed to be the worst of its type on a company on U.S. soil, also hits Sony’s reputation for a perceived failure to safeguard information. Recently on October that U.S. President Barack Obama signed an executive order to strengthen security measures for federal credit cards, and urged banks and retailers to follow suit in an effort to combat cyber theft and identity fraud. Several major corporations would take steps to make their own systems more secure and offer more customer protections as well.

These recommendations came after many other large companies including Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, JPMorgan Chase, Nasdaq OMX, Neiman Marcus, Target and Wal-mart had suffered high-profile cyber security breaches. It is not beyond the realm of possibilities to think that today the information of every American has already been compromised in any of these publicly disclosed attacks.

For instance, JPMorgan Chase, America’s largest bank with $2.39 trillion in assets, has revealed that about 76 million households and 7 million of small-business customers have been impacted by a cybersecurity attack in one of the most sweeping disclosed global breaches. Unknown attackers stole customers’ contact information, which included names, email addresses, phone numbers and addresses, affecting an amount equivalent to two-thirds of American households.

Cyber Security World Conference 2015 New York City (http://www.CyberSecurityWorldConference.com) will provide a platform for information security authorities and innovative service providers to distil their latest research for hundreds of senior executives focused on protecting enterprise and government valuable assets. Cyber security experts will discuss subjects such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Top-of-mind topics that Cyber Security World Conference 2015 will discuss include:

  • Cyber Security Megatrends Security Professionals can’t Ignore Today
  • Strengthening the Security of Industry-wide Technology Infrastructure
  • How Hackers Really Operate to Obtain Financial Data
  • Cyber Security and its Role in the Overall Security of the United States
  • Key Considerations about Security in the Internet of Things Age
  • Designing and Managing Effective Information Security Programs

Cyber Security World Conference 2015 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Standard