SlideShare ist ein Scribd-Unternehmen logo
1 von 13
Downloaden Sie, um offline zu lesen
SUMMARY REPORT
13 March 2014
Hotel Amigo
Brussels
Security in a Mobile World
Challenges Facing the Public Sector
Agenda
18:00	 Registration and Drinks Reception	
18:30	 Welcome Remarks from FT Chair	
Christian Oliver, EU Correspondent, Financial Times
18:40	 Keynote Address
Reinhard Priebe, Director,‘Internal Security’, European Commission, DG Home Affairs
•	 The cybersecurity challenge: how the EU is fighting cybercrime
•	 The potential value of public-private cooperation
•	 Data protection and privacy
•	 Tackling the issue of post-Snowden surveillance
19:00	 Dinner	
20:00	 Panel Discussion: The Security Challenge
•	 How do you believe cyber crime has evolved over the past few years and what impact has this	
	 had on the public sector? Is there the right focus on security?
•	 As security threats continue to grow, how can all parties work together to fight the criminals? 	
	 Can we ever hope to get policy agreed internationally, and will it ever be able to keep up 	
	 with technology?
•	 What impact have the latest technology trends had on mobile computing (cloud, BYOD)? 	
	 As we become increasingly connected, what risks are we exposed to? Which kind of mobile 	
	 devices do people buy, and to what extent might consumers act in a more protectionist way 	
	 e.g avoiding foreign products?
•	 What is your perspective on the planned EU data protection reforms? Is there a risk of 	
	 having too many restraints on the way security operations are run? At what point should a 	
	 company report a breach?
•	 In a post Snowden world how can we strike a balance between security, ethics and privacy; 	
	 the need to be overt vs covert?
PANELLISTS
Mike Loginov, Chief Strategist, EMEA Cyber Security – Public Sector, HP
Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges Division, NATO
Marc Vael, International Vice-President, ISACA
ModeratOR
Christian Oliver, EU Correspondent, Financial Times
21:00	 Concluding Remarks from FT Chair
Christian Oliver, EU Correspondent, Financial Times
21:05	 Networking Drinks
SECURITY IN A MOBILE WORLD
Summary Report
The Financial Times, in association with
HP, hosted a private dinner forum on
Thursday 13th March to discuss the latest
security threats being faced by public sector
institutions in Brussels and the steps which
are being taken to address them. Here are the
key insights gathered from the event.
Keynote Address:
Fighting Cyber Crime Together
The keynote speaker began with an update on
the latest progress with the European Union’s
cyber security strategy.This document from
the European Commission proposes to
show how involving all relevant parties is the
most effective way of addressing the cyber
security challenge. It outlines the top priorities
for achieving cyber resilience and reducing
cybercrime, whilst also reflecting the core
values of the EU.
The extent to which the public and private
sectors can work together to combat cyber
crime was discussed. Public authorities
increasingly rely on private companies to
carry out their security tasks, as this is
where data is mostly stored, but is it fair for
private companies to be asked to provide
their data for public needs, in the majority of
cases without compensation? Despite any
conflicting interests, it is critical to establish
a balance between public and private
concerns in order to progress with cyber
security policies.
In today’s digital world, data protection is
still crucial but existing principles must also
adapt to new innovations. It was recognised
that, as with all new developments in our
society, first comes the excitement and then
the awareness of the need for rules; the
internet offers a new dimension of freedom
of expression and freedom of business, which
have to be understood before problems can
be addressed.Additionally, different countries
have varying perspectives on the concept
of internet freedom so cyber diplomacy
is important in order to achieve a balance
through dialogue and negotiation.
SECURITY IN A MOBILE WORLD
Panel Discussion:
The Security Challenge
Facing the growing cyber security threat
The panel opened with the question of
whether or not the challenge of the cyber
threat has been over-estimated. It was argued
that we need to look at the facts, as evidence
suggests that adversaries are remaining
undetected in IT systems for longer than ever
before, and that once identified it takes even
longer to fight and remove them. Building on
this, one panellist stated that the cyber threat
will be with us for a long time before a solution
can be found, in contrast to other instances in
history where responses to attacks were rapid.
As data quantities continue to grow, the threat
of attacks will also increase. Despite this, it
was recognised that 90% of current attacks
are relatively simple and could be avoided with
the right security culture in place.
Protecting data – whose responsibility is it?
The issue of where responsibility lies for
security was a major topic of discussion.
In order to make our increasingly mobile
and digital world safer it is clear that greater
collaboration is necessary. One panellist made
the point that the Internet is the one area
of security that preoccupies governments
because most of the networks are in the
hands of the private sector.The conclusion
was that it is a vast problem which will require
greater interaction of various levels of society
in order to find a solution, but with clearly
defined responsibilities.
Following this, the importance of individual
awareness was emphasised, with one panellist
suggesting that while we should all be aware
that our data is being stored somewhere, the
question we should be asking is, what is it
being used for and what controls are in place
to protect it?
The ‘Bring Your Own Device’trend was a
shared concern, along with the question of
how much data can be collectively contained.
Summary Report
There is a danger of over-classification of data,
which has the potential to slow everything
down.With this in mind, organisations should
start looking at“what it is I am trying to
protect and what it is I am willing to give up”.
On the subject of privacy one panellist
observed that“people accept risk if they
feel it brings them value”. Companies should
embrace technology but in an intelligent way,
encouraging a culture in which people are
aware of security.The panel was in agreement
that greater board level recognition of security
issues is needed.Aside from this, it was felt
that the challenge lies in allowing people the
freedom to use the devices they want while
also ensuring that the necessary controls are
in place to protect data.
The move towards transparency
As a final point, it was suggested that
following the Snowden revelations intelligence
agencies will be more central to security in
future, as nations focus on trying to anticipate
and prevent threats in advance rather than
reacting to them.The problem lies in the
sheer quantity of data that is being generated,
which makes it very difficult to accurately
identify security threats.
One panellist concluded that the key word
moving into the next few years is trust:
both in the Internet and of citizens in their
governments. Greater transparency is
required in order to establish a culture of trust.
BIOGRAPHIES
CHAIR
Christian Oliver
EU Correspondent
Financial Times
Christian Oliver has been the Financial Times’ EU Correspondent
since January 2014 and is based in Brussels. He started out as a
journalist with Reuters in 2002, covering the UK. He was then
posted to Iran from 2003 to 2006 and Venezuela from 2006 to
2007. Mr Oliver joined the FT in 2008 as Korea Correspondent and
became Deputy Analysis Editor in London in 2012.
Security in a Mobile World
Reinhard Priebe
Director, ‘Internal Security’
European Commission, DG Home Affairs
Reinhard Priebe has been the Director of ‘Internal Security’ in the
Directorate General Home Affairs since 2010. He joined the
European Commission in 1984 as Directorate General for
Agriculture, where he served in the ‘Agricultural Law’ unit until
1991; Assistant to the Deputy Director General (1991-1993); Head
of the unit for ‘Measures of Objective 5a of Structural Funds,
Agro-environmental and Early Retirement Schemes (1993-1997); and Head of the
unit for ‘Agricultural Law’ (1997-2001). From 2001 to 2006 Mr Priebe was the
Director for the ‘Western Balkans’ in the Directorate General for External Relations
and Enlargement. From 2006 to 2008 he served as Director for ‘Conservation
Policy’ in the Directorate General for Fisheries and Maritime Affairs. From 2008 to
2009 he was the Director of ‘Atlantic, Outermost Regions and Arctic’ in the
Directorate General of Maritime Affairs and Fisheries.
Before joining the European Commission, Mr Priebe was the Assistant at the
Federal Constitutional Court from 1979 to 1983. Prior to this he served as a judge
at the Administrative Court in Stuttgart (1977 to 1979). He completed his law
degree in 1972.
Keynote
Mike Loginov
Chief Strategist, EMEA Cyber Security – Public Sector
HP
Mike Loginov is the Chief Strategist for Enterprise Security
Services and has responsibility for the EMEA cyber security
strategy for the public sector.
Prior to this role Mr Loginov was the Chief Executive Officer of a
cyber security group and co-founder of Executive Risk Magazine, a
cyber security and risk publication for executives. He also served as UK Managing
Director for an IT global services organisation where he ran teams of ethical
hackers, CLAS, CHECK, risk management and ISO27001 Consultants prior to this
being aquired by KPMG.
Mr Loginov is a Certified Chief Information Security Officer (C|CISO) and security
practice leader with over 30 years’ experience as a retained adviser and consultant
to a number of corporates and organisations. He is also an Executive Director for
the ISSA (UK) and is an executive member on pan government advisory boards and
technology forums on digital security-related matters. He is Chairman of the Cyber
Strategist Forum, a group of industry professionals that provides a thought
leadership perspective on the bigger issues that affect government, business and
society. He also serves as an advisor to industry and government on cyber security
next generation design.
Mr Loginov was educated in the British military and has worked with a range of
government agencies and teams including CEOP/SOCA, NPIA, MoD, MoJ, special
forces, police, Big Four consultancies and as Managing Director for a List X GCHQ
accredited CLAS and CHECK facility. His interests include EU governmental
relations and the Cyber Security Digital Agenda.
PANELLISTS
BIOGRAPHIES
Security in a Mobile World
Jamie Shea
Deputy Assistant Secretary General, Emerging Security Challenges Division
NATO
Jamie Shea is Deputy Assistant Secretary General for Emerging
Security Challenges at NATO. He has been working with NATO
since 1980 in various roles: he was Director of Policy Planning in
the Private Office of the Secretary General; and Deputy Assistant
Secretary General for External Relations in the Public Diplomacy
Division. He has also served as Director of Information and Press;
Spokesman of NATO; Deputy Director of Information and Press; Deputy Head and
Senior Planning Officer at the Policy Planning and Multilateral Affairs Section of the
Political Directorate; as well as Assistant to the Secretary General of NATO for
Special Projects.
Dr Shea is involved with several prominent academic institutions. He is a professor
at the Collège d’Europe, Bruges; Visiting Lecturer in the Practice of Diplomacy at
the University of Sussex; and Associate Professor of International Relations at the
American University, Washington DC, where he also holds the position of Director of
the Brussels Overseas Study Programme. In addition to this he lectures at the
Brussels School of International Studies at the University of Kent.
Dr Shea holds a D.Phil. in Modern History from Oxford University (Lincoln College),
awarded in 1981. He is a regular lecturer and conference speaker on NATO and
European security affairs and on public diplomacy, political communication and
lobbying. Among his many associations and memberships, Dr Shea is Member of
the Advisory Board of the Security and Defence Programmes at Chatham House;
Member of the Policy Council at the World Economic Forum in Geneva; and Founder
and Member of the Board for the Security and Defence Agenda in Brussels.
PANELLISTS
BIOGRAPHIES
Marc Vael
International Vice-President
ISACA
Marc Vael is International Vice-President of ISACA and President of
the ISACA Belgium Chapter. He is also Chief Audit Executive at
Smals, a Belgian IT company which works for Belgian Federal Social
Security Institutions, where he is responsible for all internal auditing
activities reporting to the Audit committee.
Mr Vael has 20 years of active experience in risk and information security
management, BCM/DRP, data protection/privacy and IT Audit. Previously, he was
National Information Security Officer for a large consulting company for more than
five years. He is a guest professor at Antwerp Management School and Solvay
Brussels School, Deputy Member of the Flemish Privacy Commission, Board
Member of SAI and member of the Permanent Stakeholder Group of ENISA. Mr Vael
has three Master degrees and several other certifications including CISSP and CISM.
PANELLISTS
For more updates, please see our Facebook page:
www.facebook.com/FinancialTimesLive
Financial Times Live group:
http://on.ft.com/linkedin
FOLLOW FT LIVE
For live updates from events and to participate on Twitter:
www.twitter.com/ftlive
t
v
ą
Financial Times Live, the global conferences and events arm of the Financial Times,
gathers pre-eminent public and private sector decision-makers, visionaries and
strategists from the world’s most important economies and industries for a wide range
of interactive, agenda-setting programmes that combine the power of on-site discussion
and networking with the flexibility of live-streamed and on-demand broadcasting.
Chaired by senior journalists from the Financial Times and its group publications,
the summits, conferences, awards and strategic forums organised by FT Live provide
audiences with the opportunity to listen to and interact with speakers of the highest
calibre in lively and stimulating debates that cover the key issues of our time.
The Financial Times provides essential news, comment, data and analysis for the global
business community. It has a combined print and online average daily readership of 2.1
million people worldwide and a combined paid print and digital circulation of almost
629,000 (Deloitte assured, Q3 2013). FT education products now serve 34 of the world’s
top 50 business schools.
www.ft-live.com
www.ft.com
ORGANISERS
Security in a Mobile World
HP creates new possibilities for technology to have a meaningful impact on people,
businesses, governments and society. The world’s largest technology company, HP
brings together a portfolio that spans printing, personal computing, software, services
and IT infrastructure to solve customer problems.
www.hp.com
Financial Times Live
One Southwark Bridge
London SE1 9HL
UK
T: +44 (0) 20 7775 6653
E: ftlive@ft.com
www.ft-live.com/hpcio
www.ft-live.com

Weitere ähnliche Inhalte

Was ist angesagt?

Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016ITnation Luxembourg
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peacePaul van Heel
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13Signals Defense, LLC
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimesMichalis Mavis, MSc, MSc
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkIGF Indonesia
 
Combating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In NigeriaCombating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In NigeriaAcapi
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)ICT Watch
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityCharles Mok
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDr David Probert
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligenceijtsrd
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarElyssa Durant
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityDr David Probert
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Glorisosegughana
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, LondonJohn Palfreyman
 

Was ist angesagt? (17)

Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016Agenda PWC Cybersecurity Day - 18 octobre 2016
Agenda PWC Cybersecurity Day - 18 octobre 2016
 
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peaceI4ADA 2019 - Presentation Accountability & cyber security & cyber peace
I4ADA 2019 - Presentation Accountability & cyber security & cyber peace
 
Internet Safety
Internet SafetyInternet Safety
Internet Safety
 
4.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.134.01 Cyber Conference_ press release5.13
4.01 Cyber Conference_ press release5.13
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
 
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance FrameworkID IGF 2016 - Infrastruktur 3 - Security Governance Framework
ID IGF 2016 - Infrastruktur 3 - Security Governance Framework
 
Combating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In NigeriaCombating Intellectual Property Crime In Nigeria
Combating Intellectual Property Crime In Nigeria
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)Indonesia Netizen Facts (July - September 2016)
Indonesia Netizen Facts (July - September 2016)
 
Government and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in CybersecurityGovernment and Enterprise Collaboration in Cybersecurity
Government and Enterprise Collaboration in Cybersecurity
 
Development of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and OrganisationDevelopment of National Cybersecurity Strategy and Organisation
Development of National Cybersecurity Strategy and Organisation
 
Cyber Security Intelligence
Cyber Security IntelligenceCyber Security Intelligence
Cyber Security Intelligence
 
CyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels CyberwarCyberSecurity: Intellectual Property dispute fuels Cyberwar
CyberSecurity: Intellectual Property dispute fuels Cyberwar
 
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - CybersecurityUN/ITU - Organisational Structures and Incident Management - Cybersecurity
UN/ITU - Organisational Structures and Incident Management - Cybersecurity
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
CTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea GlorisoCTO-CybersecurityForum-2010-Andrea Gloriso
CTO-CybersecurityForum-2010-Andrea Gloriso
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 

Andere mochten auch (10)

Manufacturing Forum 2016
Manufacturing Forum 2016Manufacturing Forum 2016
Manufacturing Forum 2016
 
Cyber Crime is Wreaking Havoc
Cyber Crime is Wreaking HavocCyber Crime is Wreaking Havoc
Cyber Crime is Wreaking Havoc
 
The Digital Trust Paradox: The Key to Product Innovation via Big Data
The Digital Trust Paradox: The Key to Product Innovation via Big DataThe Digital Trust Paradox: The Key to Product Innovation via Big Data
The Digital Trust Paradox: The Key to Product Innovation via Big Data
 
HP Event Recap: Transformation Time for Telcos
HP Event Recap: Transformation Time for TelcosHP Event Recap: Transformation Time for Telcos
HP Event Recap: Transformation Time for Telcos
 
Partner for Innovation and Growth!
Partner for Innovation and Growth!Partner for Innovation and Growth!
Partner for Innovation and Growth!
 
HP E-Zine: Security in Media and Entertainment
HP E-Zine: Security in Media and EntertainmentHP E-Zine: Security in Media and Entertainment
HP E-Zine: Security in Media and Entertainment
 
HP E-Zine: Communications
HP E-Zine: CommunicationsHP E-Zine: Communications
HP E-Zine: Communications
 
Seize the mobile moment forrester report
Seize the mobile moment   forrester reportSeize the mobile moment   forrester report
Seize the mobile moment forrester report
 
The Convergence of Digital & the Customer Experience: Madrid
The Convergence of Digital & the Customer Experience: MadridThe Convergence of Digital & the Customer Experience: Madrid
The Convergence of Digital & the Customer Experience: Madrid
 
Executive Breach Response Playbook
Executive Breach Response PlaybookExecutive Breach Response Playbook
Executive Breach Response Playbook
 

Ähnlich wie Security in a Mobile World

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationMark Johnson
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting TopCyberNewsMAGAZINE
 
National Security and Public-Private Partnership for Cybersecurity: Strengths...
National Security and Public-Private Partnership for Cybersecurity: Strengths...National Security and Public-Private Partnership for Cybersecurity: Strengths...
National Security and Public-Private Partnership for Cybersecurity: Strengths...CODE BLUE
 
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxbenjaminjames21681
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5mataharitimoer MT
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?BlackBerry
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsIrish Future Internet Forum
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Yury Chemerkin
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016Omer Coskun
 
Outline D
Outline DOutline D
Outline Dbutest
 
Igf 2013 daily news edition 3
Igf 2013 daily news   edition 3Igf 2013 daily news   edition 3
Igf 2013 daily news edition 3mataharitimoer MT
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Mwando
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethicsUltraUploader
 
Information Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic AspectsInformation Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic Aspectsijtsrd
 
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...Zdravko Stoychev, CISM, CRISC
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)naveen p
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Ray Bugg
 
Whistleblower Protection Seminar 16-17 June 2014 - Agenda
Whistleblower Protection Seminar 16-17 June 2014 - AgendaWhistleblower Protection Seminar 16-17 June 2014 - Agenda
Whistleblower Protection Seminar 16-17 June 2014 - AgendaOECD Governance
 
eu insurance fraud 1st_Final VS255 330
eu insurance fraud 1st_Final VS255 330eu insurance fraud 1st_Final VS255 330
eu insurance fraud 1st_Final VS255 330Nicolas Turner
 

Ähnlich wie Security in a Mobile World (20)

The National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
 
Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting Top Cyber News MAGAZINE. Troels Oerting
Top Cyber News MAGAZINE. Troels Oerting
 
National Security and Public-Private Partnership for Cybersecurity: Strengths...
National Security and Public-Private Partnership for Cybersecurity: Strengths...National Security and Public-Private Partnership for Cybersecurity: Strengths...
National Security and Public-Private Partnership for Cybersecurity: Strengths...
 
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docxGovernment Information Quarterly 34 (2017) 1–7Contents lis.docx
Government Information Quarterly 34 (2017) 1–7Contents lis.docx
 
Igf 2013 daily news edititon 5
Igf 2013 daily news   edititon 5Igf 2013 daily news   edititon 5
Igf 2013 daily news edititon 5
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - SocioeconomicsMalcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
Malcolm Crompton, IIS Partners Irish Future Internet Forum - Socioeconomics
 
Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207Eu cybersecurity strategy 130207
Eu cybersecurity strategy 130207
 
European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016European Cyber Security Perspectives 2016
European Cyber Security Perspectives 2016
 
Outline D
Outline DOutline D
Outline D
 
Igf 2013 daily news edition 3
Igf 2013 daily news   edition 3Igf 2013 daily news   edition 3
Igf 2013 daily news edition 3
 
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
Vincent Ouma Mwando - strong encryption and protection of human rights-the vi...
 
A week is a long time in computer ethics
A week is a long time in computer ethicsA week is a long time in computer ethics
A week is a long time in computer ethics
 
Information Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic AspectsInformation Risk Insurance Concept and Basic Aspects
Information Risk Insurance Concept and Basic Aspects
 
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
New Challenges in Data Privacy - Cybercrime and Cybersecurity Forum 2013, Sof...
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Whistleblower Protection Seminar 16-17 June 2014 - Agenda
Whistleblower Protection Seminar 16-17 June 2014 - AgendaWhistleblower Protection Seminar 16-17 June 2014 - Agenda
Whistleblower Protection Seminar 16-17 June 2014 - Agenda
 
eu insurance fraud 1st_Final VS255 330
eu insurance fraud 1st_Final VS255 330eu insurance fraud 1st_Final VS255 330
eu insurance fraud 1st_Final VS255 330
 

Mehr von Hewlett Packard Enterprise Business Value Exchange

Mehr von Hewlett Packard Enterprise Business Value Exchange (20)

To Accelerate IT Innovation, Think like a Rocket Scientist
To Accelerate IT Innovation, Think like a Rocket ScientistTo Accelerate IT Innovation, Think like a Rocket Scientist
To Accelerate IT Innovation, Think like a Rocket Scientist
 
Connecting the manufacturing industry
Connecting the manufacturing industryConnecting the manufacturing industry
Connecting the manufacturing industry
 
Getting to your hybrid future
Getting to your hybrid futureGetting to your hybrid future
Getting to your hybrid future
 
Technology rethink for next generation loyalty programmes
Technology rethink for next generation loyalty programmesTechnology rethink for next generation loyalty programmes
Technology rethink for next generation loyalty programmes
 
Hewlett Packard Enterprise Connected Manufacturing Brochure
Hewlett Packard Enterprise Connected Manufacturing Brochure Hewlett Packard Enterprise Connected Manufacturing Brochure
Hewlett Packard Enterprise Connected Manufacturing Brochure
 
FSI Key Propositions
FSI Key PropositionsFSI Key Propositions
FSI Key Propositions
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
Happy Employees Lead to Happy Customers
Happy Employees Lead to Happy CustomersHappy Employees Lead to Happy Customers
Happy Employees Lead to Happy Customers
 
How to Deliver Value "Beyond the Pill"
How to Deliver Value "Beyond the Pill"How to Deliver Value "Beyond the Pill"
How to Deliver Value "Beyond the Pill"
 
The Path to Self-Disruption
The Path to Self-DisruptionThe Path to Self-Disruption
The Path to Self-Disruption
 
HPE Security Report 2016
HPE Security Report 2016HPE Security Report 2016
HPE Security Report 2016
 
Realising Potential - The Dandelion Program
Realising Potential - The Dandelion ProgramRealising Potential - The Dandelion Program
Realising Potential - The Dandelion Program
 
FinTech Innovation Model 2015
FinTech Innovation Model 2015FinTech Innovation Model 2015
FinTech Innovation Model 2015
 
Time for co-operation
Time for co-operationTime for co-operation
Time for co-operation
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Awareness is only the first step
Awareness is only the first stepAwareness is only the first step
Awareness is only the first step
 
Time for co-operation
Time for co-operationTime for co-operation
Time for co-operation
 
Personalize the Travel Experience - and Gain Insights
Personalize the Travel Experience - and Gain Insights Personalize the Travel Experience - and Gain Insights
Personalize the Travel Experience - and Gain Insights
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
BVEx Research: Open Data Unlocked
BVEx Research: Open Data UnlockedBVEx Research: Open Data Unlocked
BVEx Research: Open Data Unlocked
 

Kürzlich hochgeladen

A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxAna-Maria Mihalceanu
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Kaya Weers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 

Kürzlich hochgeladen (20)

A Glance At The Java Performance Toolbox
A Glance At The Java Performance ToolboxA Glance At The Java Performance Toolbox
A Glance At The Java Performance Toolbox
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)Design pattern talk by Kaya Weers - 2024 (v2)
Design pattern talk by Kaya Weers - 2024 (v2)
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 

Security in a Mobile World

  • 1. SUMMARY REPORT 13 March 2014 Hotel Amigo Brussels Security in a Mobile World Challenges Facing the Public Sector
  • 2. Agenda 18:00 Registration and Drinks Reception 18:30 Welcome Remarks from FT Chair Christian Oliver, EU Correspondent, Financial Times 18:40 Keynote Address Reinhard Priebe, Director,‘Internal Security’, European Commission, DG Home Affairs • The cybersecurity challenge: how the EU is fighting cybercrime • The potential value of public-private cooperation • Data protection and privacy • Tackling the issue of post-Snowden surveillance 19:00 Dinner 20:00 Panel Discussion: The Security Challenge • How do you believe cyber crime has evolved over the past few years and what impact has this had on the public sector? Is there the right focus on security? • As security threats continue to grow, how can all parties work together to fight the criminals? Can we ever hope to get policy agreed internationally, and will it ever be able to keep up with technology? • What impact have the latest technology trends had on mobile computing (cloud, BYOD)? As we become increasingly connected, what risks are we exposed to? Which kind of mobile devices do people buy, and to what extent might consumers act in a more protectionist way e.g avoiding foreign products? • What is your perspective on the planned EU data protection reforms? Is there a risk of having too many restraints on the way security operations are run? At what point should a company report a breach? • In a post Snowden world how can we strike a balance between security, ethics and privacy; the need to be overt vs covert? PANELLISTS Mike Loginov, Chief Strategist, EMEA Cyber Security – Public Sector, HP Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges Division, NATO Marc Vael, International Vice-President, ISACA ModeratOR Christian Oliver, EU Correspondent, Financial Times 21:00 Concluding Remarks from FT Chair Christian Oliver, EU Correspondent, Financial Times 21:05 Networking Drinks SECURITY IN A MOBILE WORLD
  • 3. Summary Report The Financial Times, in association with HP, hosted a private dinner forum on Thursday 13th March to discuss the latest security threats being faced by public sector institutions in Brussels and the steps which are being taken to address them. Here are the key insights gathered from the event. Keynote Address: Fighting Cyber Crime Together The keynote speaker began with an update on the latest progress with the European Union’s cyber security strategy.This document from the European Commission proposes to show how involving all relevant parties is the most effective way of addressing the cyber security challenge. It outlines the top priorities for achieving cyber resilience and reducing cybercrime, whilst also reflecting the core values of the EU. The extent to which the public and private sectors can work together to combat cyber crime was discussed. Public authorities increasingly rely on private companies to carry out their security tasks, as this is where data is mostly stored, but is it fair for private companies to be asked to provide their data for public needs, in the majority of cases without compensation? Despite any conflicting interests, it is critical to establish a balance between public and private concerns in order to progress with cyber security policies. In today’s digital world, data protection is still crucial but existing principles must also adapt to new innovations. It was recognised that, as with all new developments in our society, first comes the excitement and then the awareness of the need for rules; the internet offers a new dimension of freedom of expression and freedom of business, which have to be understood before problems can be addressed.Additionally, different countries have varying perspectives on the concept of internet freedom so cyber diplomacy is important in order to achieve a balance through dialogue and negotiation.
  • 4. SECURITY IN A MOBILE WORLD Panel Discussion: The Security Challenge Facing the growing cyber security threat The panel opened with the question of whether or not the challenge of the cyber threat has been over-estimated. It was argued that we need to look at the facts, as evidence suggests that adversaries are remaining undetected in IT systems for longer than ever before, and that once identified it takes even longer to fight and remove them. Building on this, one panellist stated that the cyber threat will be with us for a long time before a solution can be found, in contrast to other instances in history where responses to attacks were rapid. As data quantities continue to grow, the threat of attacks will also increase. Despite this, it was recognised that 90% of current attacks are relatively simple and could be avoided with the right security culture in place. Protecting data – whose responsibility is it? The issue of where responsibility lies for security was a major topic of discussion. In order to make our increasingly mobile and digital world safer it is clear that greater collaboration is necessary. One panellist made the point that the Internet is the one area of security that preoccupies governments because most of the networks are in the hands of the private sector.The conclusion was that it is a vast problem which will require greater interaction of various levels of society in order to find a solution, but with clearly defined responsibilities. Following this, the importance of individual awareness was emphasised, with one panellist suggesting that while we should all be aware that our data is being stored somewhere, the question we should be asking is, what is it being used for and what controls are in place to protect it? The ‘Bring Your Own Device’trend was a shared concern, along with the question of how much data can be collectively contained.
  • 5. Summary Report There is a danger of over-classification of data, which has the potential to slow everything down.With this in mind, organisations should start looking at“what it is I am trying to protect and what it is I am willing to give up”. On the subject of privacy one panellist observed that“people accept risk if they feel it brings them value”. Companies should embrace technology but in an intelligent way, encouraging a culture in which people are aware of security.The panel was in agreement that greater board level recognition of security issues is needed.Aside from this, it was felt that the challenge lies in allowing people the freedom to use the devices they want while also ensuring that the necessary controls are in place to protect data. The move towards transparency As a final point, it was suggested that following the Snowden revelations intelligence agencies will be more central to security in future, as nations focus on trying to anticipate and prevent threats in advance rather than reacting to them.The problem lies in the sheer quantity of data that is being generated, which makes it very difficult to accurately identify security threats. One panellist concluded that the key word moving into the next few years is trust: both in the Internet and of citizens in their governments. Greater transparency is required in order to establish a culture of trust.
  • 6. BIOGRAPHIES CHAIR Christian Oliver EU Correspondent Financial Times Christian Oliver has been the Financial Times’ EU Correspondent since January 2014 and is based in Brussels. He started out as a journalist with Reuters in 2002, covering the UK. He was then posted to Iran from 2003 to 2006 and Venezuela from 2006 to 2007. Mr Oliver joined the FT in 2008 as Korea Correspondent and became Deputy Analysis Editor in London in 2012.
  • 7. Security in a Mobile World Reinhard Priebe Director, ‘Internal Security’ European Commission, DG Home Affairs Reinhard Priebe has been the Director of ‘Internal Security’ in the Directorate General Home Affairs since 2010. He joined the European Commission in 1984 as Directorate General for Agriculture, where he served in the ‘Agricultural Law’ unit until 1991; Assistant to the Deputy Director General (1991-1993); Head of the unit for ‘Measures of Objective 5a of Structural Funds, Agro-environmental and Early Retirement Schemes (1993-1997); and Head of the unit for ‘Agricultural Law’ (1997-2001). From 2001 to 2006 Mr Priebe was the Director for the ‘Western Balkans’ in the Directorate General for External Relations and Enlargement. From 2006 to 2008 he served as Director for ‘Conservation Policy’ in the Directorate General for Fisheries and Maritime Affairs. From 2008 to 2009 he was the Director of ‘Atlantic, Outermost Regions and Arctic’ in the Directorate General of Maritime Affairs and Fisheries. Before joining the European Commission, Mr Priebe was the Assistant at the Federal Constitutional Court from 1979 to 1983. Prior to this he served as a judge at the Administrative Court in Stuttgart (1977 to 1979). He completed his law degree in 1972. Keynote
  • 8. Mike Loginov Chief Strategist, EMEA Cyber Security – Public Sector HP Mike Loginov is the Chief Strategist for Enterprise Security Services and has responsibility for the EMEA cyber security strategy for the public sector. Prior to this role Mr Loginov was the Chief Executive Officer of a cyber security group and co-founder of Executive Risk Magazine, a cyber security and risk publication for executives. He also served as UK Managing Director for an IT global services organisation where he ran teams of ethical hackers, CLAS, CHECK, risk management and ISO27001 Consultants prior to this being aquired by KPMG. Mr Loginov is a Certified Chief Information Security Officer (C|CISO) and security practice leader with over 30 years’ experience as a retained adviser and consultant to a number of corporates and organisations. He is also an Executive Director for the ISSA (UK) and is an executive member on pan government advisory boards and technology forums on digital security-related matters. He is Chairman of the Cyber Strategist Forum, a group of industry professionals that provides a thought leadership perspective on the bigger issues that affect government, business and society. He also serves as an advisor to industry and government on cyber security next generation design. Mr Loginov was educated in the British military and has worked with a range of government agencies and teams including CEOP/SOCA, NPIA, MoD, MoJ, special forces, police, Big Four consultancies and as Managing Director for a List X GCHQ accredited CLAS and CHECK facility. His interests include EU governmental relations and the Cyber Security Digital Agenda. PANELLISTS BIOGRAPHIES
  • 9. Security in a Mobile World Jamie Shea Deputy Assistant Secretary General, Emerging Security Challenges Division NATO Jamie Shea is Deputy Assistant Secretary General for Emerging Security Challenges at NATO. He has been working with NATO since 1980 in various roles: he was Director of Policy Planning in the Private Office of the Secretary General; and Deputy Assistant Secretary General for External Relations in the Public Diplomacy Division. He has also served as Director of Information and Press; Spokesman of NATO; Deputy Director of Information and Press; Deputy Head and Senior Planning Officer at the Policy Planning and Multilateral Affairs Section of the Political Directorate; as well as Assistant to the Secretary General of NATO for Special Projects. Dr Shea is involved with several prominent academic institutions. He is a professor at the Collège d’Europe, Bruges; Visiting Lecturer in the Practice of Diplomacy at the University of Sussex; and Associate Professor of International Relations at the American University, Washington DC, where he also holds the position of Director of the Brussels Overseas Study Programme. In addition to this he lectures at the Brussels School of International Studies at the University of Kent. Dr Shea holds a D.Phil. in Modern History from Oxford University (Lincoln College), awarded in 1981. He is a regular lecturer and conference speaker on NATO and European security affairs and on public diplomacy, political communication and lobbying. Among his many associations and memberships, Dr Shea is Member of the Advisory Board of the Security and Defence Programmes at Chatham House; Member of the Policy Council at the World Economic Forum in Geneva; and Founder and Member of the Board for the Security and Defence Agenda in Brussels. PANELLISTS
  • 10. BIOGRAPHIES Marc Vael International Vice-President ISACA Marc Vael is International Vice-President of ISACA and President of the ISACA Belgium Chapter. He is also Chief Audit Executive at Smals, a Belgian IT company which works for Belgian Federal Social Security Institutions, where he is responsible for all internal auditing activities reporting to the Audit committee. Mr Vael has 20 years of active experience in risk and information security management, BCM/DRP, data protection/privacy and IT Audit. Previously, he was National Information Security Officer for a large consulting company for more than five years. He is a guest professor at Antwerp Management School and Solvay Brussels School, Deputy Member of the Flemish Privacy Commission, Board Member of SAI and member of the Permanent Stakeholder Group of ENISA. Mr Vael has three Master degrees and several other certifications including CISSP and CISM. PANELLISTS
  • 11. For more updates, please see our Facebook page: www.facebook.com/FinancialTimesLive Financial Times Live group: http://on.ft.com/linkedin FOLLOW FT LIVE For live updates from events and to participate on Twitter: www.twitter.com/ftlive t v ą Financial Times Live, the global conferences and events arm of the Financial Times, gathers pre-eminent public and private sector decision-makers, visionaries and strategists from the world’s most important economies and industries for a wide range of interactive, agenda-setting programmes that combine the power of on-site discussion and networking with the flexibility of live-streamed and on-demand broadcasting. Chaired by senior journalists from the Financial Times and its group publications, the summits, conferences, awards and strategic forums organised by FT Live provide audiences with the opportunity to listen to and interact with speakers of the highest calibre in lively and stimulating debates that cover the key issues of our time. The Financial Times provides essential news, comment, data and analysis for the global business community. It has a combined print and online average daily readership of 2.1 million people worldwide and a combined paid print and digital circulation of almost 629,000 (Deloitte assured, Q3 2013). FT education products now serve 34 of the world’s top 50 business schools. www.ft-live.com www.ft.com ORGANISERS
  • 12. Security in a Mobile World HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. The world’s largest technology company, HP brings together a portfolio that spans printing, personal computing, software, services and IT infrastructure to solve customer problems. www.hp.com
  • 13. Financial Times Live One Southwark Bridge London SE1 9HL UK T: +44 (0) 20 7775 6653 E: ftlive@ft.com www.ft-live.com/hpcio www.ft-live.com