SlideShare a Scribd company logo
THE NATIONAL CYBER-FORENSICS AND TRAINING ALLIANCE
ONE TEAM, ONE GOAL. COMPANIES, GOVERNMENT, AND ACADAMIA WORKING TOGETHER TO NEUTRALIZE CYBER CRIME.
Establishing trusted relationships is critical to information sharing, and sharing near real-time information is important to our partners.
But that’s just the first step. Our partners understand that information isn’t necessarily intelligence. Getting to intelligence takes
going beyond information or indicators. It takes people, process, and a bit of technology. Our team of analysts applies the human
factor to information sharing and intelligence gathering. Using shared information and our unique on-site collection of historic data,
we strive to identify actionable intelligence for our industry and law enforcement partners.
When law enforcement needs help understanding a threat, they rely on the NCFTA community of industry partners to provide insight
into the scope and impact of the threat. When industry needs a receptive ear from law enforcement, the embedded agencies at the
NCFTA are there to discretely listen. These trusted relationships enable industry and law enforcement to align priorities and resources
without compromising privacy, ethics, or the integrity of an investigation.
The NCFTA community includes cross-sector industry and law enforcement and offers the opportunity to co-locate in our neutral
environment. This unique environment allows for true collaboration and
spontaneous “aha” moments to occur.
Beyond collaboration and information sharing, we strive for measurable results
1
:
 815 cases referred to law enforcement
 289 arrests made with NCFTA contributions
 3,470 intelligence reports produced
 $83,253,280 in seizures by law enforcement
 $1,444,140,081 losses prevented (as reported by industry partners)
1
As reported by law enforcement and industry partners 2015-2016 Calendar Years
Who We Are
The National Cyber-Forensics and Training Alliance (NCFTA) is a non-profit
corporation founded in 2002, focused on identifying, mitigating, and
neutralizing cyber crime threats globally.
The NCFTA was created by industry and law
enforcement for the sole purpose of establishing a
neutral, trusted environment that enables two-way
information sharing with the ultimate goal to identify,
mitigate, disrupt, and neutralize cyber threats. Through
the NCFTA, private industry and government are able to
work together in this neutral, trusted environment.
The National Cyber-Forensics and Training
Alliance…”a model of information-sharing
platforms, bringing together different
groupings of law enforcement, the private
sector and academia to mitigate and combat
cyber threats.”
2016 Annual Meeting of the
World Economic Forum in Davos, Switzerland
INFORMATION SHARING THE NCFTA WAY
TRUSTED ENVIRONMENT
WHAT MAKES US DIFFERENT
aha moment
“the common human experience of
suddenly understanding a previously
incomprehensible problem or concept”
-Wikipedia
Organizations looking to augment their existing business risk efforts
Organizations with limited intelligence resources
Responsible stakeholders who want to make an impact for the greater good
 The NCFTA acts as an extension of your team and force multiplier for cybersecurity and threat intelligence teams, fraud
prevention groups, and brand/intellectual property protection specialists
 The NCFTA provides access to a dedicated team of analysts working across initiatives as well as a community of trusted
industry partner SMEs (Subject Matter Experts). All of our partners also have direct access to a committed, highly motivated
cadre of domestic and international law enforcement professionals
 Partners are provided with regular updates on trends, emerging threats, and near real-time threats through numerous
communication channels, feeds, peer calls, working groups, intelligence reports, and white papers
CyFin – the Cyber Financial Program is dedicated to the financial services industry. Threat actors
may seek to steal, or siphon funds from accounts and/or compromise the integrity of the global
financial infrastructure. The program seeks to develop intelligence on such threats as well as
proactive and preventive countermeasures via partnerships with financial institutions in the
banking, brokerage, and payment sectors of the financial services industry.
BCP – the Brand & Consumer Protection Program focuses on the utilization of the Internet for the
sale of retail goods, including fraud related to ecommerce transactions and the physical
distribution of counterfeit merchandise.
An estimated $1.8 billion dollars a year in fraud is perpetrated by cyber criminals using stole credit
and debit credentials to launder money through the purchase of legitimate goods. The NCFTA
provides a forum for participants from industry and law enforcement to share information and
build actionable intelligence relative to such incidents.
Counterfeit merchandise is a serious problem in terms of public safety, brand integrity, and even
national security. The NCFTA partners with industry and the National Intellectual Property Rights
Coordination Center (NIPRC) to share information and provide actionable intelligence on
individuals/groups involved in the distribution of counterfeit merchandise.
MCT – the Malware & Cyber Threats Program is dedicated to researching, identifying, and
analyzing technical cyber threats. The program provides timely alerts through data feeds and
proactive intelligence on cyber threats under analysis.
MCT maintains a data repository containing malware and corresponding network attributes being
utilized by threat actors around the world. The technical data is then correlated with other
datasets in order to associate malware with cyber crimes such as banking fraud, spam campaigns,
phishing and botnet activity. In doing so, MCT seeks to identify trends or patterns that will assist
in mitigation and neutralization efforts as well as detect future threats.
As hacktivism and terrorism continue to utilize social media to recruit new members, discuss
ongoing or upcoming events, and maintain a revenue stream, it is critical to be aware of and
observe these communications both in open source and the dark web.
To find out more about our Programs and how you can become a partner, please contact us at:
info@ncfta.net or visit our website: www.ncfta.net
NCFTA | PITTSBURGH: 2000 Technology Drive, Suite 450, Pittsburgh, PA 15219 Phone: 412-802-8000
NCFTA | NEW YORK: One Penn Plaza, 250 West 34
th
Street, Suite 2124, New York, NY 10119
NCFTA | LOS ANGELES: Wilshire Building, 601 S. Figueroa Street, Suite 1460, Los Angeles, CA 90017
WHO SHOULD JOIN
SPECIALTY PROGRAMS

More Related Content

What's hot

Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
American Chamber of Commerce in Bahrain
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
Paul van Heel
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
Boston Global Forum
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
Mark Albala
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
Russ Dutcher, CBRM,CORM,CDPS
 
S719a
S719aS719a
S719a
ecommerce
 
Reia news no48_aug15
Reia news no48_aug15Reia news no48_aug15
Reia news no48_aug15
LJ Gilland Real Estate Pty Ltd
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
Ulf Mattsson
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
Joe Nathans
 
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013 BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
Berwin Leighton Paisner
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
Ulf Mattsson
 
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
MYO AUNG Myanmar
 
Establishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident ResponseEstablishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident Response
APNIC
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
mikeecholscyber
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2
Elisha Quaye
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-risk
Dominika Rusek
 
SLVA - Privacy Framework and Approach
SLVA - Privacy Framework and ApproachSLVA - Privacy Framework and Approach
SLVA - Privacy Framework and Approach
SLVA Information Security
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
CBIZ, Inc.
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
Confederation of Indian Industry
 
RIPE NCC and Internet Governance
RIPE NCC and Internet GovernanceRIPE NCC and Internet Governance
RIPE NCC and Internet Governance
RIPE NCC
 

What's hot (20)

Cybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slidesCybersecurity in ME April 25 slides
Cybersecurity in ME April 25 slides
 
I4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & JournalismI4ADA 2019 - Accountability, Social Media & Journalism
I4ADA 2019 - Accountability, Social Media & Journalism
 
COMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORKCOMMON GOOD DIGITAL FRAMEWORK
COMMON GOOD DIGITAL FRAMEWORK
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
S719a
S719aS719a
S719a
 
Reia news no48_aug15
Reia news no48_aug15Reia news no48_aug15
Reia news no48_aug15
 
Advanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protectionAdvanced PII / PI data discovery and data protection
Advanced PII / PI data discovery and data protection
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013 BAFT-IFSA Social Media and Banking Global Webinar - June 2013
BAFT-IFSA Social Media and Banking Global Webinar - June 2013
 
Protecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine LearningProtecting Data Privacy in Analytics and Machine Learning
Protecting Data Privacy in Analytics and Machine Learning
 
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020User Privacy or Cyber Sovereignty Freedom House Special Report 2020
User Privacy or Cyber Sovereignty Freedom House Special Report 2020
 
Establishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident ResponseEstablishment of Threat Intel into Incident Response
Establishment of Threat Intel into Incident Response
 
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat informationWhy shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
Why shaWHY SHARE CYBER THREAT INFORMATIONre cyber threat information
 
uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2uk-cyber-security-strategy-final-2
uk-cyber-security-strategy-final-2
 
deloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-riskdeloitte-nl-fsi-cyber-value-at-risk
deloitte-nl-fsi-cyber-value-at-risk
 
SLVA - Privacy Framework and Approach
SLVA - Privacy Framework and ApproachSLVA - Privacy Framework and Approach
SLVA - Privacy Framework and Approach
 
Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020Commercial Real Estate - Cyber Risk 2020
Commercial Real Estate - Cyber Risk 2020
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
RIPE NCC and Internet Governance
RIPE NCC and Internet GovernanceRIPE NCC and Internet Governance
RIPE NCC and Internet Governance
 

Similar to Matt LaVigna - Cyber Security - NCFTA 2017

NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
David Sweigert
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
Kayisa Herman Dube
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
Saman Sara
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
Kristin Judge
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
BlackBerry
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
Samantha Wagner
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
Kevin Leffew
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
Philippe Boivineau
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
Omer Coskun
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
Centre for Strategic Cyberspace + Security Science
 
Partnering-int-the-fight-against-financial-crime.pdf
Partnering-int-the-fight-against-financial-crime.pdfPartnering-int-the-fight-against-financial-crime.pdf
Partnering-int-the-fight-against-financial-crime.pdf
ssusere15f981
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
Team Finland Future Watch
 
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
ADISPO Asociación de directores de seguridad
 
Threat Indicators and Cyber Intelligence Sharing in Financial Sector
Threat Indicators and Cyber Intelligence Sharing in Financial SectorThreat Indicators and Cyber Intelligence Sharing in Financial Sector
Threat Indicators and Cyber Intelligence Sharing in Financial Sector
Blaz Ivanc
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
International Federation of Accountants
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
Lapman Lee ✔
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
Jeewanthi Fernando
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
CMR WORLD TECH
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
Mark Johnson
 
2018 ic3 report
2018 ic3 report2018 ic3 report
2018 ic3 report
malvvv
 

Similar to Matt LaVigna - Cyber Security - NCFTA 2017 (20)

NCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency ManagementNCRIC Analysis of Cyber Security Emergency Management
NCRIC Analysis of Cyber Security Emergency Management
 
Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016Conference on Digital Forensics & Cyber Security 2016
Conference on Digital Forensics & Cyber Security 2016
 
Cyber crime in the digital age
Cyber crime in the digital ageCyber crime in the digital age
Cyber crime in the digital age
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Cybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources ReportCybersecurity: Protecting Local Government Digital Resources Report
Cybersecurity: Protecting Local Government Digital Resources Report
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Securing information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WPSecuring information in the New Digital Economy- Oracle Verizon WP
Securing information in the New Digital Economy- Oracle Verizon WP
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUPCYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
CYBERSECURITY CYBERCRIME CYBER INTELLIGENCE GROUP
 
Partnering-int-the-fight-against-financial-crime.pdf
Partnering-int-the-fight-against-financial-crime.pdfPartnering-int-the-fight-against-financial-crime.pdf
Partnering-int-the-fight-against-financial-crime.pdf
 
Understanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in AsiaUnderstanding Cyber Security Risks in Asia
Understanding Cyber Security Risks in Asia
 
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
EUROPOL: THE INTERNET ORGANISED CRIME THREAT ASSESSMENT (IOCTA) 2015
 
Threat Indicators and Cyber Intelligence Sharing in Financial Sector
Threat Indicators and Cyber Intelligence Sharing in Financial SectorThreat Indicators and Cyber Intelligence Sharing in Financial Sector
Threat Indicators and Cyber Intelligence Sharing in Financial Sector
 
The Impact of Technology on the Profession
The Impact of Technology on the ProfessionThe Impact of Technology on the Profession
The Impact of Technology on the Profession
 
Accenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threatsAccenture re-organizing-todays-cyber-threats
Accenture re-organizing-todays-cyber-threats
 
Assignment 1
Assignment 1Assignment 1
Assignment 1
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
2018 ic3 report
2018 ic3 report2018 ic3 report
2018 ic3 report
 

More from Invest Northern Ireland

Grant writing masterclass 16 August 2019
Grant writing masterclass 16 August 2019Grant writing masterclass 16 August 2019
Grant writing masterclass 16 August 2019
Invest Northern Ireland
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
Invest Northern Ireland
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
Invest Northern Ireland
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
Invest Northern Ireland
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
Invest Northern Ireland
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
Invest Northern Ireland
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
Invest Northern Ireland
 
Funding for Innovation in ICT 21 May 2019
Funding for Innovation in ICT 21 May 2019Funding for Innovation in ICT 21 May 2019
Funding for Innovation in ICT 21 May 2019
Invest Northern Ireland
 
Innovate UK funding application answer guide slides
Innovate UK funding application answer guide slidesInnovate UK funding application answer guide slides
Innovate UK funding application answer guide slides
Invest Northern Ireland
 
Finance Options in a Dynamic Environment
Finance Options in a Dynamic EnvironmentFinance Options in a Dynamic Environment
Finance Options in a Dynamic Environment
Invest Northern Ireland
 
Invest NI Brexit Information Workshop - February 2019
Invest NI Brexit Information Workshop - February 2019Invest NI Brexit Information Workshop - February 2019
Invest NI Brexit Information Workshop - February 2019
Invest Northern Ireland
 
Design for Export
Design for ExportDesign for Export
Design for Export
Invest Northern Ireland
 
Design for Export
Design for ExportDesign for Export
Design for Export
Invest Northern Ireland
 
Design for Export
Design for ExportDesign for Export
Design for Export
Invest Northern Ireland
 
Presentation - Funding for Innovation in Life & Health Sciences
Presentation - Funding for Innovation in Life & Health SciencesPresentation - Funding for Innovation in Life & Health Sciences
Presentation - Funding for Innovation in Life & Health Sciences
Invest Northern Ireland
 
Stephen McComb - Masterclass - Funding for Innovation in Life & Health Sciences
Stephen McComb - Masterclass - Funding for Innovation in Life & Health SciencesStephen McComb - Masterclass - Funding for Innovation in Life & Health Sciences
Stephen McComb - Masterclass - Funding for Innovation in Life & Health Sciences
Invest Northern Ireland
 
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Invest Northern Ireland
 
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Invest Northern Ireland
 
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Invest Northern Ireland
 
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Invest Northern Ireland
 

More from Invest Northern Ireland (20)

Grant writing masterclass 16 August 2019
Grant writing masterclass 16 August 2019Grant writing masterclass 16 August 2019
Grant writing masterclass 16 August 2019
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
 
Horizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & ManufacturingHorizon 2020 ICT and Advanced Materials & Manufacturing
Horizon 2020 ICT and Advanced Materials & Manufacturing
 
Funding for Innovation in ICT 21 May 2019
Funding for Innovation in ICT 21 May 2019Funding for Innovation in ICT 21 May 2019
Funding for Innovation in ICT 21 May 2019
 
Innovate UK funding application answer guide slides
Innovate UK funding application answer guide slidesInnovate UK funding application answer guide slides
Innovate UK funding application answer guide slides
 
Finance Options in a Dynamic Environment
Finance Options in a Dynamic EnvironmentFinance Options in a Dynamic Environment
Finance Options in a Dynamic Environment
 
Invest NI Brexit Information Workshop - February 2019
Invest NI Brexit Information Workshop - February 2019Invest NI Brexit Information Workshop - February 2019
Invest NI Brexit Information Workshop - February 2019
 
Design for Export
Design for ExportDesign for Export
Design for Export
 
Design for Export
Design for ExportDesign for Export
Design for Export
 
Design for Export
Design for ExportDesign for Export
Design for Export
 
Presentation - Funding for Innovation in Life & Health Sciences
Presentation - Funding for Innovation in Life & Health SciencesPresentation - Funding for Innovation in Life & Health Sciences
Presentation - Funding for Innovation in Life & Health Sciences
 
Stephen McComb - Masterclass - Funding for Innovation in Life & Health Sciences
Stephen McComb - Masterclass - Funding for Innovation in Life & Health SciencesStephen McComb - Masterclass - Funding for Innovation in Life & Health Sciences
Stephen McComb - Masterclass - Funding for Innovation in Life & Health Sciences
 
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
 
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
 
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
 
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020Networking Event for Personalised, Digital Health Innovations in Horizon 2020
Networking Event for Personalised, Digital Health Innovations in Horizon 2020
 

Recently uploaded

Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
OECD Directorate for Financial and Enterprise Affairs
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
ToshihiroIto4
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
1990 Media
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
Faculty of Medicine And Health Sciences
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
OECD Directorate for Financial and Enterprise Affairs
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 

Recently uploaded (19)

Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
 
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 

Matt LaVigna - Cyber Security - NCFTA 2017

  • 1. THE NATIONAL CYBER-FORENSICS AND TRAINING ALLIANCE ONE TEAM, ONE GOAL. COMPANIES, GOVERNMENT, AND ACADAMIA WORKING TOGETHER TO NEUTRALIZE CYBER CRIME. Establishing trusted relationships is critical to information sharing, and sharing near real-time information is important to our partners. But that’s just the first step. Our partners understand that information isn’t necessarily intelligence. Getting to intelligence takes going beyond information or indicators. It takes people, process, and a bit of technology. Our team of analysts applies the human factor to information sharing and intelligence gathering. Using shared information and our unique on-site collection of historic data, we strive to identify actionable intelligence for our industry and law enforcement partners. When law enforcement needs help understanding a threat, they rely on the NCFTA community of industry partners to provide insight into the scope and impact of the threat. When industry needs a receptive ear from law enforcement, the embedded agencies at the NCFTA are there to discretely listen. These trusted relationships enable industry and law enforcement to align priorities and resources without compromising privacy, ethics, or the integrity of an investigation. The NCFTA community includes cross-sector industry and law enforcement and offers the opportunity to co-locate in our neutral environment. This unique environment allows for true collaboration and spontaneous “aha” moments to occur. Beyond collaboration and information sharing, we strive for measurable results 1 :  815 cases referred to law enforcement  289 arrests made with NCFTA contributions  3,470 intelligence reports produced  $83,253,280 in seizures by law enforcement  $1,444,140,081 losses prevented (as reported by industry partners) 1 As reported by law enforcement and industry partners 2015-2016 Calendar Years Who We Are The National Cyber-Forensics and Training Alliance (NCFTA) is a non-profit corporation founded in 2002, focused on identifying, mitigating, and neutralizing cyber crime threats globally. The NCFTA was created by industry and law enforcement for the sole purpose of establishing a neutral, trusted environment that enables two-way information sharing with the ultimate goal to identify, mitigate, disrupt, and neutralize cyber threats. Through the NCFTA, private industry and government are able to work together in this neutral, trusted environment. The National Cyber-Forensics and Training Alliance…”a model of information-sharing platforms, bringing together different groupings of law enforcement, the private sector and academia to mitigate and combat cyber threats.” 2016 Annual Meeting of the World Economic Forum in Davos, Switzerland INFORMATION SHARING THE NCFTA WAY TRUSTED ENVIRONMENT WHAT MAKES US DIFFERENT aha moment “the common human experience of suddenly understanding a previously incomprehensible problem or concept” -Wikipedia
  • 2. Organizations looking to augment their existing business risk efforts Organizations with limited intelligence resources Responsible stakeholders who want to make an impact for the greater good  The NCFTA acts as an extension of your team and force multiplier for cybersecurity and threat intelligence teams, fraud prevention groups, and brand/intellectual property protection specialists  The NCFTA provides access to a dedicated team of analysts working across initiatives as well as a community of trusted industry partner SMEs (Subject Matter Experts). All of our partners also have direct access to a committed, highly motivated cadre of domestic and international law enforcement professionals  Partners are provided with regular updates on trends, emerging threats, and near real-time threats through numerous communication channels, feeds, peer calls, working groups, intelligence reports, and white papers CyFin – the Cyber Financial Program is dedicated to the financial services industry. Threat actors may seek to steal, or siphon funds from accounts and/or compromise the integrity of the global financial infrastructure. The program seeks to develop intelligence on such threats as well as proactive and preventive countermeasures via partnerships with financial institutions in the banking, brokerage, and payment sectors of the financial services industry. BCP – the Brand & Consumer Protection Program focuses on the utilization of the Internet for the sale of retail goods, including fraud related to ecommerce transactions and the physical distribution of counterfeit merchandise. An estimated $1.8 billion dollars a year in fraud is perpetrated by cyber criminals using stole credit and debit credentials to launder money through the purchase of legitimate goods. The NCFTA provides a forum for participants from industry and law enforcement to share information and build actionable intelligence relative to such incidents. Counterfeit merchandise is a serious problem in terms of public safety, brand integrity, and even national security. The NCFTA partners with industry and the National Intellectual Property Rights Coordination Center (NIPRC) to share information and provide actionable intelligence on individuals/groups involved in the distribution of counterfeit merchandise. MCT – the Malware & Cyber Threats Program is dedicated to researching, identifying, and analyzing technical cyber threats. The program provides timely alerts through data feeds and proactive intelligence on cyber threats under analysis. MCT maintains a data repository containing malware and corresponding network attributes being utilized by threat actors around the world. The technical data is then correlated with other datasets in order to associate malware with cyber crimes such as banking fraud, spam campaigns, phishing and botnet activity. In doing so, MCT seeks to identify trends or patterns that will assist in mitigation and neutralization efforts as well as detect future threats. As hacktivism and terrorism continue to utilize social media to recruit new members, discuss ongoing or upcoming events, and maintain a revenue stream, it is critical to be aware of and observe these communications both in open source and the dark web. To find out more about our Programs and how you can become a partner, please contact us at: info@ncfta.net or visit our website: www.ncfta.net NCFTA | PITTSBURGH: 2000 Technology Drive, Suite 450, Pittsburgh, PA 15219 Phone: 412-802-8000 NCFTA | NEW YORK: One Penn Plaza, 250 West 34 th Street, Suite 2124, New York, NY 10119 NCFTA | LOS ANGELES: Wilshire Building, 601 S. Figueroa Street, Suite 1460, Los Angeles, CA 90017 WHO SHOULD JOIN SPECIALTY PROGRAMS