Hi [[ session.user.profile.firstName ]]

Current Cyber Attack Trends and Forecasts for the Financial Industry

Cyber attacks are on the rise, and financial institutions are increasingly becoming targets of sophisticated attackers. Join this presentation and learn about the current cyber-attacks affecting the industry.
David Swan, EVP of the Defense Intelligence Group will discuss current attacks, attack trends and forecasts what banks and other financial institutions can expect in the near to middle term.
Recorded Aug 10 2016 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
David Swan, EVP Defense Intelligence Group, CSCSS
Presentation preview: Current Cyber Attack Trends and Forecasts for the Financial Industry

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber Supply Chains: Risks & Protection Recorded: Nov 30 2016 36 mins
    Curtis KS Levinson, VP Strategic Cyberspace Science, US Cyber Defence Advisor to NATO
    Cyber space is composed of, and dependent on, supply chains. Our hardware and software are created in multiple locations by a multitude of suppliers and vendors. A single PC board may contain chips from many different nations, each with their own companies and manufacturing plant. Software is highly dependent on updates, which we receive mostly automatically and is directly incorporated in the software we depend on daily.

    We, as a society are getting more skilled at protecting our technology from cyber-attack by hardening our network perimeters, improving anti-virus/malware tools and encrypting everything we can. The one thing we DO NOT do is evaluate what our cyber supply chain(s) are. We understand their importance to our daily tasks, to our lifestyles, and to our incomes. We need to looking into what our supply chains really are, understand their functionality and investigate ways to begin protecting them.

    Viewers will:
    • Understand the basic nature of cyber supply chains
    • Gain insight into cyber supply chain vulnerabilities
    • Learn how to begin protecting our cyber supply chains


    Presenter:
    Curtis KS Levinson
    VP Strategic Cyberspace Science, US Cyber Defence Advisor to NATO
  • Intelligence: The Planners Strategic Edge Recorded: Nov 30 2016 45 mins
    David Swan, EVP Defence Intelligence Group, CSCSS
    This presentation is an overview of “Making Intelligence Work,” a training program offered by the Cyber Intelligence Defence Centre. When correctly employed, intelligence provides direction for long-term planning (strategic intelligence), direction in the current cyber battlefield (operational intelligence) as well as direct support to defend against current attacks (tactical intelligence). This guidance is developed in the executive suite and is deployed into the organization. The program provides executives with the tools to deploy and utilize intelligence in their organizations.

    Presenter:
    David Swan, Executive Vice President, Defence Intelligence Group, Director CSCSS Cyber Intelligence Defence Centre (CIDC)
  • Cyber-Intelligence: Protecting Yourself Against Your Own Worst Enemy Recorded: Nov 30 2016 44 mins
    David Nordell, SVP International Cyber Strategy, CSCSS
    In order to protect your organization from cyber attacks, you need to understand who your enemies are, and how they see you as a target. This means turning your vision and your intelligence capabilities on yourself and taking a very hard look at what makes you worth attacking and what your vulnerabilities are.

    Key points to consider:
    - Looking beyond current cyber defenses
    - How well trained and prepared is your staff for an eventual attack?
    - How much financial, reputation and regulatory damage can you afford to suffer?
    - Is your organizational culture built to learn and adapt rapidly without wasting time and energy on blaming others?
    - How would your external stakeholders respond to your being attacked?
    - How would you be affected by attacks on other parties in your ecosystem (or vice versa)?

    This all takes hard work, but is likely to ensure that when – not if – you are attacked, you will have a much higher chance of survival.

    Presenter:
    David Nordell, Senior Vice President, International Cyber Strategy, CSCSS
  • Best Practices for Preparing for Breaches Recorded: Nov 30 2016 44 mins
    Dr Phoebe Fletcher, VP International Policy and Political Science, CSCSS
    With malware, phishing and zero day attacks becoming more sophisticated, it’s impossible as a business to be 100% secure against a breach. As numerous high profile cases have demonstrated over the past year, breaches can cause serious reputational damage, particularly if customer’s personal details have been jeopardised or private business information has been leaked.
    Preparing for breaches is part of good governance and requires close coordination between management, cyber security professionals and your communications department. This presentation will discuss the best practices for preparing for breaches.

    Viewers will learn about:
    • Provides models for best practice governance, including the coordination of governance, cyber security professionals and communications.
    • Explains how to put together a risk management plan.
    • Examines different strategies for communicating breaches and their merits.
  • Cyber Attackers and the Law - Threats, Challenges & Regulations Recorded: Nov 30 2016 49 mins
    Dr. Virginia Greiman, Sr. Advisor and Chair, CSCSS
    With cyber attacks increasing in frequency and impact, it is critical to understand the barriers to the development of international norms of behavior in cyberspace, the deficiencies in the law and the challenges faced by governments, the private sector, and international organizations including the United Nations and the North Atlantic Treaty Organization (NATO) in defining thresholds for a domain with various levels of entry.

    This presentation will define the various aggressors in cyberspace based on the type, purpose and impact of the attack, and then analyze how they are regulated by existing laws including international treaties, the law of war, and domestic civil and criminal law.

    Viewers will learn:
    • Legal models for threat analysis
    • How cyber attackers are treated under various legal systems
    • The outcome of some of the world's largest cyber-attacks and the responses of the international community and nation states

    Presenter:
    Dr. Virginia Greiman, Sr. Advisor & Chair of the Centre for Strategic Cyberspace and Security Science (CSCSS) Cyberlaw and International Policy Centre
  • Cyber Security and the Boardroom Relationship Recorded: Nov 30 2016 39 mins
    Mike Gillespie, VP C3i Cybersecurity, Cybercrime & Cyber Intelligence Group
    The boardroom understanding what ‘cyber security’ really means, is going through a radical transformation. In many ways, our business leaders are a little late to the table for this particular feast, but their leadership and strategic thinking are vital if they are to steer their business ships through the challenging cyber-waters ahead. Research shows that many boards are well behind the joined up thinking demonstrated by cyber-criminal groups. But what does this mean for the business world at large?
  • Smart Cities & Critical Infrastructure Cyber Attack Vulnerabilities Recorded: Nov 30 2016 38 mins
    Dr. Gil Duvall, Senior Advisor, International Cyber Strategies & Integrated Operations, Chair Cyber Education Centre
    This presentation addresses how the international adoption of smart technologies and the increased reliance on networking them in cyberspace has increased cyber attack risks for "Smart Cities."

    Smart Cities are urban centers designed to integrate cyber technologies and physical infrastructures to create environmental and economic efficiencies while improving the overall quality of life of its citizens. While the benefits of Smart City technologies are well recognized, the risks associated with cyber-physical system integration in urban critical infrastructures is not well understood. Smart City system integration has increased the cyber attack surface immeasurably for malicious actors to exploit ICT vulnerabilities to create cyber attacks which can disrupt essential services, physical damage equipment, or cause loss of life.

    This presentation focuses on the types cyber attacks that are possible against Smart Cities and the consequences when directed at Transportation Systems, the Electrical Grid, Water Supply, and Wastewater Disposal critical infrastructures.

    Presenter:
    Dr. Gil Duvall, Sr. Advisor, International Cyber Strategies & Integrated Operations
  • Threat Brief: Cyber Attack Trends & Hacker Activity Forecasts Recorded: Nov 9 2016 31 mins
    David Swan, Director of the CIDC, CSCSS
    With cyber attacks on the rise and high-profile breaches becoming the new normal, being on top of the current trends in cyber threats is key to improving your cybersecurity posture. Join this threat brief and learn about the latest threatscape. David Swan, Director of the CIDC will discuss the top cyber security headlines, identify some emerging trends and provide analysis and forecasts of hacker activity.
  • Dyn Distributed Denial of Service: Impact & Lessons Learned Recorded: Nov 3 2016 59 mins
    Richard Zaluski, CEO and Founder of CSCSS & David Swan, Director of the Cyber Intelligence Defence Centre, CSCSS
    Join this presentation to learn the facts about the recent Distributed Denial of Service (DDoS) attack on Dyn. Discover the impact of the attack, and the likelihood of a repeat attack of the same or greater magnitude.

    Richard Zaluski, President and CEO of CSCSS and David Swan, Director of the Cyber Intelligence Defence Centre will discuss the causes behind the Internet outages on October 21 and the implications of the attack.
  • Current Cyber Attack Trends and Forecasts for the Financial Industry Recorded: Aug 10 2016 33 mins
    David Swan, EVP Defense Intelligence Group, CSCSS
    Cyber attacks are on the rise, and financial institutions are increasingly becoming targets of sophisticated attackers. Join this presentation and learn about the current cyber-attacks affecting the industry.
    David Swan, EVP of the Defense Intelligence Group will discuss current attacks, attack trends and forecasts what banks and other financial institutions can expect in the near to middle term.
Center for Strategic Cyberspace + Security Science
Established in the United Kingdom, the Center for Strategic Cyberspace + Security Science is a bipartisan, multilateral, international nonprofit organization headquartered in London, United Kingdom. It seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Current Cyber Attack Trends and Forecasts for the Financial Industry
  • Live at: Aug 10 2016 6:00 pm
  • Presented by: David Swan, EVP Defense Intelligence Group, CSCSS
  • From:
Your email has been sent.
or close