SlideShare a Scribd company logo
1 of 10
SPONSORED BY:
Cyber Risk: The New Norm
Wednesday, May 10, 2017
SPONSORED BY:
MODERATOR:
PANELISTS:
David Jordan
Chief Information Security Officer
Invesco
Keith Hale
CEO, Multifonds
Michael Anaya
Supervisory Special Agent and Cyber PCOR
FBI Atlanta
The Current
Cyber Landscape
Increased Risk
 Social engineering
 Infrastructure weakness
 Increasing interconnectivity of financial ecosystem
 Lack of industry collaboration
 Rapid pace of technological advancements
 Increasing digitalization
Evolving Public Policy
 NY DFS
 FRB, OCC, FDIC
 CFTC
 FinCEN
 FINRA
 GDPR
 PSD II
Evolving Roles:
CISO, FBI
Expanding Roles:
Protect: shield and defend
Monitor: hunt and detect
Govern: comply and educate
Respond: recover and sustain
Advise: manage risk and report
TECHNOLOGY EXPERTS | RISK ADVISORS
Three Tenets:
C:“Confidentiality”;
Who has access to what?
I: “Integrity”;
Is the data correct?
A: “Availability”’
Is access enabled when it’s needed?
Risk Assessment:
A Shift in IT Security Priorities
Networks
Hardware
Software
mobile applications | artificial intelligence | robotics | blockchain | cloud solutions
Anatomy of a Breach
Intrusion Lifecycle
 Initial recon
 Initial compromise
 Establish foothold
 Escalate privileges
 Internal recon
 Move laterally
 Maintain presence
 Complete mission
Investigative Actions
 Financial loss
 Logs
 Evidence
 Subject matter expertise
Inquiries
 US Court Systems & the FBI
Polling Question
Do You Feel “CYBER-READY?”
a) Yes
b) No
SPONSORED BY:
CLARITY
 Identify roles from top down
 Define responsibilities from C-level to junior employees
FITNESS
 Constantly reassess internal and third-party security capabilities
 Upgrade/transform existing systems
READINESS
 Achieve situational awareness
 Know the current landscape (traditional v. new threats)
 Create response team
 Take a proactive stance
Firm Preparedness:
What Should My Firm be Doing?
SPONSORED BY:
Questions
SPONSORED BY:
Thank you!
#WebinarWednesdays

More Related Content

What's hot

Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityIna Luft
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityDistil Networks
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate PerspectiveDawn Yankeelov
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionNext Dimension Inc.
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019PECB
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdfSania Baker
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Dawn Yankeelov
 
Information Security: quali aree di investimento?
Information Security: quali aree di investimento? Information Security: quali aree di investimento?
Information Security: quali aree di investimento? Mauro Marigliano
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Matthew Rosenquist
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertGareth Niblett
 
Naesys at secure it conference 2017
Naesys at secure it conference 2017Naesys at secure it conference 2017
Naesys at secure it conference 2017Naesys_Ndspl
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)Kroll
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Leonardo
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksTripwire
 

What's hot (20)

Cyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on SecurityCyber Resilience: A New Perspective on Security
Cyber Resilience: A New Perspective on Security
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Keeping up with the Revolution in IT Security
Keeping up with the Revolution in IT SecurityKeeping up with the Revolution in IT Security
Keeping up with the Revolution in IT Security
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
Cybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next DimensionCybersecurity: Protection strategies from Cisco and Next Dimension
Cybersecurity: Protection strategies from Cisco and Next Dimension
 
Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019Top Cyber Threat Predictions for 2019
Top Cyber Threat Predictions for 2019
 
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
4 Reasons Why Your Business Needs A Cyber Security Consultant.pdf
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019Cyber Security Threats Facing Small Businesses--June 2019
Cyber Security Threats Facing Small Businesses--June 2019
 
Sect r33
Sect r33Sect r33
Sect r33
 
Information Security: quali aree di investimento?
Information Security: quali aree di investimento? Information Security: quali aree di investimento?
Information Security: quali aree di investimento?
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
 
BCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay AlertBCS ITNow 201412 - Stay Alert
BCS ITNow 201412 - Stay Alert
 
Naesys at secure it conference 2017
Naesys at secure it conference 2017Naesys at secure it conference 2017
Naesys at secure it conference 2017
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership Selex ES at Le Bourget 2013 Cyber Partnership
Selex ES at Le Bourget 2013 Cyber Partnership
 
Defending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber AttacksDefending Critical Infrastructure Against Cyber Attacks
Defending Critical Infrastructure Against Cyber Attacks
 
Managing Insider Risk
Managing Insider RiskManaging Insider Risk
Managing Insider Risk
 

Similar to Cyber Risk – The New Norm

The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistMatthew Rosenquist
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityPC Doctors NET
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017Maurice Dawson
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew RosenquistMatthew Rosenquist
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Time based security for cloud computing
Time based security for cloud computingTime based security for cloud computing
Time based security for cloud computingJorge Sebastiao
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber securityzapp0
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfSymptai Consulting Limited
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityRow Murray
 
Data Protection for Higher Education
Data Protection for Higher EducationData Protection for Higher Education
Data Protection for Higher EducationKate Carruthers
 

Similar to Cyber Risk – The New Norm (20)

Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...Insights success the 10 best performing cyber security solution providers 4th...
Insights success the 10 best performing cyber security solution providers 4th...
 
The Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew RosenquistThe Future of Cyber Security - Matthew Rosenquist
The Future of Cyber Security - Matthew Rosenquist
 
csxnewsletter
csxnewslettercsxnewsletter
csxnewsletter
 
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on CybersecurityDeepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
Deepfake Technology's Emergence: Exploring Its Impact on Cybersecurity
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Building Cyber Resilience
Building Cyber ResilienceBuilding Cyber Resilience
Building Cyber Resilience
 
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
STAYING SAFE AND SECURED ON TODAY AND TOMORROW’S AFRICA CYBERSPACE WORKSHOP 2017
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Time based security for cloud computing
Time based security for cloud computingTime based security for cloud computing
Time based security for cloud computing
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Education to cyber security
Education to cyber securityEducation to cyber security
Education to cyber security
 
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdfStrengthening Caribbean Business against Cyber Attacks May 18.pdf
Strengthening Caribbean Business against Cyber Attacks May 18.pdf
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
What's Hot In IT - Cybersecurity
What's Hot In IT - CybersecurityWhat's Hot In IT - Cybersecurity
What's Hot In IT - Cybersecurity
 
Data Protection for Higher Education
Data Protection for Higher EducationData Protection for Higher Education
Data Protection for Higher Education
 

More from NICSA

Understanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data QualityUnderstanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data QualityNICSA
 
The Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: BlockchainThe Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: BlockchainNICSA
 
Industry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing RoundtableIndustry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing RoundtableNICSA
 
Understanding Regulation Best Interest
Understanding Regulation Best InterestUnderstanding Regulation Best Interest
Understanding Regulation Best InterestNICSA
 
Trends in the Advisor Market
Trends in the Advisor Market Trends in the Advisor Market
Trends in the Advisor Market NICSA
 
New Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance LandscapeNew Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance LandscapeNICSA
 
Navigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions LandscapeNavigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions LandscapeNICSA
 
Engaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse WorkforceEngaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse WorkforceNICSA
 
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate OutcomesRetirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate OutcomesNICSA
 
Building Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with DataBuilding Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with DataNICSA
 
FinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the HorizonFinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the HorizonNICSA
 
Preparing for the Next-Gen Client Base
Preparing for the Next-Gen Client BasePreparing for the Next-Gen Client Base
Preparing for the Next-Gen Client BaseNICSA
 
Tax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting TrapsTax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting TrapsNICSA
 
Next Generation Proxy Voting
Next Generation Proxy VotingNext Generation Proxy Voting
Next Generation Proxy VotingNICSA
 
Best Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance ProgramBest Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance ProgramNICSA
 
AI Trends with Traction
AI Trends with TractionAI Trends with Traction
AI Trends with TractionNICSA
 
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-DeliveryRule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-DeliveryNICSA
 
Rethinking Product Development
Rethinking Product DevelopmentRethinking Product Development
Rethinking Product DevelopmentNICSA
 
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the WorkplaceThe Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the WorkplaceNICSA
 
Data Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business StrategyData Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business StrategyNICSA
 

More from NICSA (20)

Understanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data QualityUnderstanding ROI: The Real Impact of Data Quality
Understanding ROI: The Real Impact of Data Quality
 
The Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: BlockchainThe Reality Behind Buzzwords Series: Blockchain
The Reality Behind Buzzwords Series: Blockchain
 
Industry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing RoundtableIndustry Leaders Outlook: Product & Marketing Roundtable
Industry Leaders Outlook: Product & Marketing Roundtable
 
Understanding Regulation Best Interest
Understanding Regulation Best InterestUnderstanding Regulation Best Interest
Understanding Regulation Best Interest
 
Trends in the Advisor Market
Trends in the Advisor Market Trends in the Advisor Market
Trends in the Advisor Market
 
New Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance LandscapeNew Challenges on the TA Compliance Landscape
New Challenges on the TA Compliance Landscape
 
Navigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions LandscapeNavigating Turbulent Changes to the Sanctions Landscape
Navigating Turbulent Changes to the Sanctions Landscape
 
Engaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse WorkforceEngaging and Empowering A Diverse Workforce
Engaging and Empowering A Diverse Workforce
 
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate OutcomesRetirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
Retirement 2020: Maximize Participation,Boost Efficiency & Accelerate Outcomes
 
Building Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with DataBuilding Deeper Advisory Relationships with Data
Building Deeper Advisory Relationships with Data
 
FinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the HorizonFinReg Outlook: Clouds on the Horizon
FinReg Outlook: Clouds on the Horizon
 
Preparing for the Next-Gen Client Base
Preparing for the Next-Gen Client BasePreparing for the Next-Gen Client Base
Preparing for the Next-Gen Client Base
 
Tax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting TrapsTax & Reporting Update: Avoiding Fund Reporting Traps
Tax & Reporting Update: Avoiding Fund Reporting Traps
 
Next Generation Proxy Voting
Next Generation Proxy VotingNext Generation Proxy Voting
Next Generation Proxy Voting
 
Best Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance ProgramBest Practices in Building a Global Compliance Program
Best Practices in Building a Global Compliance Program
 
AI Trends with Traction
AI Trends with TractionAI Trends with Traction
AI Trends with Traction
 
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-DeliveryRule 30e-3: Best Practices for Notice, Access & E-Delivery
Rule 30e-3: Best Practices for Notice, Access & E-Delivery
 
Rethinking Product Development
Rethinking Product DevelopmentRethinking Product Development
Rethinking Product Development
 
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the WorkplaceThe Bottom Line: Exploring the Benefits of Wellness in the Workplace
The Bottom Line: Exploring the Benefits of Wellness in the Workplace
 
Data Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business StrategyData Analytics 301: Converting Analysis into Business Strategy
Data Analytics 301: Converting Analysis into Business Strategy
 

Recently uploaded

Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Avanish Goel
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designsegoetzinger
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free DeliveryPooja Nehwal
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfAdnet Communications
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...yordanosyohannes2
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companiesprashantbhati354
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesMarketing847413
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...First NO1 World Amil baba in Faisalabad
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...shivangimorya083
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...Henry Tapper
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Roomdivyansh0kumar0
 
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130Suhani Kapoor
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdfHenry Tapper
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...Financial institutions facilitate financing, economic transactions, issue fun...
Financial institutions facilitate financing, economic transactions, issue fun...
 
Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024Bladex Earnings Call Presentation 1Q2024
Bladex Earnings Call Presentation 1Q2024
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
Instant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School DesignsInstant Issue Debit Cards - School Designs
Instant Issue Debit Cards - School Designs
 
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services  9892124323 | ₹,4500 With Room Free DeliveryMalad Call Girl in Services  9892124323 | ₹,4500 With Room Free Delivery
Malad Call Girl in Services 9892124323 | ₹,4500 With Room Free Delivery
 
Lundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdfLundin Gold April 2024 Corporate Presentation v4.pdf
Lundin Gold April 2024 Corporate Presentation v4.pdf
 
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
AfRESFullPaper22018EmpiricalPerformanceofRealEstateInvestmentTrustsandShareho...
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
Quantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector CompaniesQuantitative Analysis of Retail Sector Companies
Quantitative Analysis of Retail Sector Companies
 
Q3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast SlidesQ3 2024 Earnings Conference Call and Webcast Slides
Q3 2024 Earnings Conference Call and Webcast Slides
 
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
Authentic No 1 Amil Baba In Pakistan Authentic No 1 Amil Baba In Karachi No 1...
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
Russian Call Girls In Gtb Nagar (Delhi) 9711199012 💋✔💕😘 Naughty Call Girls Se...
 
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
letter-from-the-chair-to-the-fca-relating-to-british-steel-pensions-scheme-15...
 
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130  Available With RoomVIP Kolkata Call Girl Serampore 👉 8250192130  Available With Room
VIP Kolkata Call Girl Serampore 👉 8250192130 Available With Room
 
Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024Monthly Economic Monitoring of Ukraine No 231, April 2024
Monthly Economic Monitoring of Ukraine No 231, April 2024
 
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
VIP Call Girls Service Begumpet Hyderabad Call +91-8250192130
 
fca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdffca-bsps-decision-letter-redacted (1).pdf
fca-bsps-decision-letter-redacted (1).pdf
 
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in  Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Nand Nagri (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
🔝9953056974 🔝Call Girls In Dwarka Escort Service Delhi NCR
 

Cyber Risk – The New Norm

  • 1. SPONSORED BY: Cyber Risk: The New Norm Wednesday, May 10, 2017
  • 2. SPONSORED BY: MODERATOR: PANELISTS: David Jordan Chief Information Security Officer Invesco Keith Hale CEO, Multifonds Michael Anaya Supervisory Special Agent and Cyber PCOR FBI Atlanta
  • 3. The Current Cyber Landscape Increased Risk  Social engineering  Infrastructure weakness  Increasing interconnectivity of financial ecosystem  Lack of industry collaboration  Rapid pace of technological advancements  Increasing digitalization Evolving Public Policy  NY DFS  FRB, OCC, FDIC  CFTC  FinCEN  FINRA  GDPR  PSD II
  • 4. Evolving Roles: CISO, FBI Expanding Roles: Protect: shield and defend Monitor: hunt and detect Govern: comply and educate Respond: recover and sustain Advise: manage risk and report TECHNOLOGY EXPERTS | RISK ADVISORS Three Tenets: C:“Confidentiality”; Who has access to what? I: “Integrity”; Is the data correct? A: “Availability”’ Is access enabled when it’s needed?
  • 5. Risk Assessment: A Shift in IT Security Priorities Networks Hardware Software mobile applications | artificial intelligence | robotics | blockchain | cloud solutions
  • 6. Anatomy of a Breach Intrusion Lifecycle  Initial recon  Initial compromise  Establish foothold  Escalate privileges  Internal recon  Move laterally  Maintain presence  Complete mission Investigative Actions  Financial loss  Logs  Evidence  Subject matter expertise Inquiries  US Court Systems & the FBI
  • 7. Polling Question Do You Feel “CYBER-READY?” a) Yes b) No
  • 8. SPONSORED BY: CLARITY  Identify roles from top down  Define responsibilities from C-level to junior employees FITNESS  Constantly reassess internal and third-party security capabilities  Upgrade/transform existing systems READINESS  Achieve situational awareness  Know the current landscape (traditional v. new threats)  Create response team  Take a proactive stance Firm Preparedness: What Should My Firm be Doing?

Editor's Notes

  1. Moderator: Welcome to another NICSA Webinar Wednesday. Today, we will be talking about current trends in cyber threats facing the asset management industry and what businesses can and should be doing to safeguard client data and other sensitive information—and we’ll be doing this through two unique lenses: from that of a Chief Information Security Officer of a leading global asset manager, and an FBI cyber expert. We’d like to thank ALFI, The Association of the Luxembourg Fund Industry – an organization with a long-standing partnership with NICSA – for sponsoring today’s event. [Introduction of self, brief bio] [SPEAKING TIME: 2 minutes]
  2. To begin, I would like to take a few minutes to cover our objectives and introduce our panel. In this webinar participants will: Understand the current cyber risk landscape Gain insight into how CISOs are assessing risk and prioritizing IT spend Examine best practices related to governance and risk management processes Introduction of panel, BIOS below: David A. Jordan is the Chief Information Security Officer for Invesco. David’s primary responsibility is for the strategic design and implementation of Invesco’s Information Security and Business Recovery Services. David’s been with Invesco since 1998 and previously worked for the Management Consulting Services practice of Price Waterhouse, and the British Ministry of Defense in London. He is a Certified Information Systems Auditor and a Certified Information Security Manager. We also have Michael Anaya, a Supervisory Special Agent with the FBI’s Atlanta Field Office’s Cyber Squad. Cybercrime takes on many forms, and it is the FBI's role in the cyber landscape to address all forms of this persistent threat. Michal has conducted work as a lead Agent on several complex cyber cases and has a breadth of knowledge (spanning 12 years) in various other investigations involving program fraud, extortion, terrorism, fugitive apprehension, and counterintelligence. [Speaking time: 3 minutes]
  3. Question 1: Let’s begin with a “state of the union,” if you will, of the current cybersecurity environment. What are the biggest cyber risks for the asset management industry today and how has this changed over the last few years? [FBI] – Overall view of the environment; biggest cyber threats for financial institutions [CISO] – Real world examples of security breaches (Swift Network, Bangladesh hack) Question 2: It’s been a busy year for global financial institutions as they’ve tried to keep up with cyber standards. We’ve seen regulations emerge from several regulatory bodies – with a keen focus on upping the ante on cyber risk management. While all of these standards are a positive for the industry, many firms -- here and abroad -- are struggling to reconcile the guidance from the various sources. Which regulations are top of mind for asset management executives? [CISO] – What CISOs are watching (in terms of regulations); impact to businesses; touch on vendor risk management, and incident response [FBI] – Frameworks that are trying to be established; incentives to disclose breaches Question 3: Where do you see it going from here (in terms of regulations/cyber spend/risks)? What do you think is on the horizon? [CISO] – Outlook on cybersecurity scope/scale [FBI] – Outlook on risks [Speaking time: 11 minutes]
  4. Question 4: Let’s dig a little deeper into the business implications. How are business models changing in asset management? What is the “new normal”? [CISO] – Define “new normal” – what asset managers should be doing; “must haves” in today’s environment. Question 5: David, can you give us your take on how the role of Chief Information Officer has evolved over the past 5 to ten years? And what do you think CEOs and boards need to know about cybersecurity? [CISO] – Overview of evolution of CISO. Question 6: Michael, how has the role of the FBI changed in terms of its direct interaction with CEOs and boards? [FBI] – CEOs and boards need to know threats/understand the landscape [Speaking time: 11 minutes]
  5. Question 7: With constant innovation in fin tech – from mobile applications, to artificial intelligence and blockchain technology – how have the security priorities changed? How do firms keep pace with technological advancements while at the same time increasing their data security processes and procedures? [CISO] – Tech should be lockstep with security; importance of risk impact analyses [Moderator] – RFPs, number of security questions rising Question 8: Given the acceleration of technology and increased scrutiny on governance over data security, where are firms making investments and why? What are big tech-savvy firms doing, and what should smaller firms with limited resources be doing? [CISO] – Increased efforts in intelligence gathering [Speaking time: 9 minutes]
  6. Question 9: So, what happens if there is a breach? What is reportable, what’s not? How does the FBI work in relation with the US court system? [FBI] – Thresholds for “reportability”; when servers are ceased/businesses shut down; Overview of FBI and US court system (and how investigations may be impacted) [Speaking time: 5 minutes]
  7. Question 9: So, what happens if there is a breach? What is reportable, what’s not? How does the FBI work in relation with the US court system? [FBI] – Thresholds for “reportability”; when servers are ceased/businesses shut down; Overview of FBI and US court system (and how investigations may be impacted) [Speaking time: 5 minutes]
  8. Question 10: We have discussed the policy landscape, the emerging risks to businesses, and the evolving role of technology professionals within the asset management industry. Reflecting on all of these themes, let’s end with a synopsis of the most important things that firms can be doing today to safeguard data and protect against security breaches. [FBI] –Get to know local FBI; proactively plan for a breach; review of functions as set forth by NIST: Identify, Protect, Detect, Respond, and Recover. [CISO] – How CISCO is managing cyber policies/cyber spend trends [SPEAKING TIME: 9 minutes]
  9. Moderator: I’d like to thank our panelists for such a thorough examination of these evolving issues. We’re going to open the line for Q&A at this time… [Filler questions: Can you talk a bit about the convergence of cyber and physical security under a single header? In terms of reporting lines, who should “cyber” report to? How would a company work with the FBI? What type of information is requested if there is a breach?] [SPEAKING TIME: 10 minutes]
  10. Moderator: I’d like to thank our panelists for such a thorough examination of these evolving issues. We’re going to open the line for Q&A at this time… [Filler questions: Can you talk a bit about the convergence of cyber and physical security under a single header? In terms of reporting lines, who should “cyber” report to? How would a company work with the FBI? What type of information is requested if there is a breach?] [SPEAKING TIME: 10 minutes]