The CISO as a Systems Integrator

Size: px
Start display at page:

Download "The CISO as a Systems Integrator"

Transcription

1 The CISO as a Systems Integrator AKA: Building Your Network Defense through Bad Car Analogies and Idioms Joe McMann Cyber Strategy Leader 2017 LEIDOS. ALL RIGHTS RESERVED. 17-Leidos PIRA #DIS The wording LEIDOS used throughout is a registered trademark in the U.S. Patent and Trademark Office owned by Leidos, Inc.

2 Cybersecurity as a Racetrack Going round and round Why are we here? Why are we still here? How do we get secure? Why aren t we secure yet? Why is this so hard? Why is this still so hard? 2017 LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

3 Kicking the can down the road. Solutions come and go yet the questions persist. Are we asking the right questions? Is there a finish line? LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

4 Slow and steady wins the race. Success [in cybersecurity] is a journey, not a destination. Map: Executable strategy Vehicles: Solution delivery models to suit Travel Companions: Trusted advisors & proven practitioners Snacks: Training, frameworks, tailored technology Cyber is a forever challenge LEIDOS. ALL RIGHTS RESERVED.

5 Siri, how do I get to Secure? Cyber Journey Best practices baseline Turn right Drive towards intelligence Arrive at waypoint, plot next objective Intelligence is the collection of information of value and the ability to acquire and apply knowledge and skills LEIDOS. ALL RIGHTS RESERVED.

6 The CISO as a Systems Integrator Systems integrators generally have to be good at matching customers needs with existing products The current problem is how to harness all the information available, from the various information generators (or sensors) into one complete picture As well as the design of the actual interfaces much effort is being put into presenting the information in a useful manner. Wikipedia Objective: Find those elements which bring value and apply them across people, process, and technology to create a sum greater than it s parts LEIDOS. ALL RIGHTS RESERVED.

7 All roads lead to Rome. At least they should. Establish operations: Develop capabilities Refine processes Train skillsets Evolve tradecraft: Encourage mindset Empower the analyst Gather expertise Build a foundation: Define the mission Form relationships Manage information Ensure visibility LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

8 Case Study: Putting the cart before the horse. Large, international enterprise with federated business units Many non-standardized external connections Proposed a big-data analytics solution for threat hunting Challenges: Incomplete data-set. Solution applied to a limited % of primary gateways. Unknown number of non-standard ingress/egress methods. Post-event detection only. No active mitigations or controls LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

9 Rome wasn t built in a day. Five Essential Components for Success Mission focused organization Structured process strategy Visibility, awareness and control Repeatable analysis framework Measurement and accountability 2017 LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

10 Organizational Integration The mission depends on collaboration across the entire organization Strive to operate in a culture of yes, we ll find the right way Cybersecurity no longer exists as a Black Box. CISO organization stands at center of bi-directional feedback loop between CND operations and the rest of the business and must broker inputs and outputs LEIDOS. ALL RIGHTS RESERVED.

11 Analysts Corporate Comms Physical Security Network Defense Engineering & Development Counter-Intelligence Perimeter Physical Security Human Resources CISO Enterprise Controls Host Identity & Asset Management Corporate IT Business Units Policy & Compliance Education & Awareness LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

12 Process Integration Strategy Plan out processes from the ground up: Define inputs and outputs for each Understand interface points and relationships Build from daily operations Foundational processes should feed, inform, and guide strategic efforts Ask yourself if a process stands on it s own, with limited connectivity back to the core, is it providing value? Does the process belong in this mission for this organization? LEIDOS. ALL RIGHTS RESERVED.

13 Incident Response Communicate Internal Drivers Coordination Employees Detections and Alerts Triage Leadership & LOBs Employee Notifications Detection & Analysis Remediate Public, LE, Government Testing & Simulation Real-time External Drivers Historical Mitigations & Protections Measure & Report Industry Partnerships Pivoting & Hunting Network Activity Intelligence Host Effectiveness Vendors & Suppliers Tactical & Strategic Impact 2017 LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

14 Technical Integration Where the rubber hits the road. Not just a collection of solutions Understand how they fit, how they integrate, how they flow Source: The Racetrack Model: Driving Informed Defense Through Analytic Completeness 2016 Lockheed Martin. All rights reserved LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

15 Go with the flow. Map out capabilities in a logical flow Intrinsic values Order of operations? Active/Passive? Derived values What information do they provide? What happens if? Source: The Racetrack Model: Driving Informed Defense Through Analytic Completeness 2016 Lockheed Martin. All rights reserved LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

16 Case Study: Getting a tune-up. Prime utility company, pieces in place across organization and process. Technology portfolio largely built out, needed to enhance the SIEM capabilities for analysts Challenges: While baseline capabilities existed, available data was not being utilized Some controls feeding SIEM were pushing high-noise, low-value events Limited ability to measure, record, and report on effectiveness of tuning LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

17 Souvenirs Build on a strong foundation Understand dependencies in the simplest form: People without technology are frustrated Technology without people lacks context and impact People and technology without process leads to chaos Visibility is paramount. Always start there. If you can t see it, you can t detect it. If you can t detect it, you can t analyze it. If you can t analyze it, you ll never know how to stop it LEIDOS. ALL RIGHTS RESERVED. 17-Leidos

18 Thank you. Questions and Discussion

Second Quarter Fiscal 2018 Investor Presentation

Second Quarter Fiscal 2018 Investor Presentation Second Quarter Fiscal 2018 Investor Presentation Disclaimers Non-GAAP Financial Measures The presentation presents information about the Company s non-gaap revenue, non-gaap gross margin, non-gaap operating

More information

7 STEPS TO BUILD A GRC FRAMEWORK FOR BUSINESS RISK MANAGEMENT BUSINESS-DRIVEN SECURITY SOLUTIONS

7 STEPS TO BUILD A GRC FRAMEWORK FOR BUSINESS RISK MANAGEMENT BUSINESS-DRIVEN SECURITY SOLUTIONS 7 STEPS TO BUILD A GRC FRAMEWORK FOR BUSINESS RISK MANAGEMENT BUSINESS-DRIVEN SECURITY SOLUTIONS TO MANAGE INFORMATION RISK AND KEEP YOUR ORGANIZATION MOVING FORWARD, YOU NEED A SOLID STRATEGY AND A GOOD

More information

Alternative Investments Advisory Services. kpmg.com

Alternative Investments Advisory Services. kpmg.com Alternative Investments Advisory Services kpmg.com Alternative investment opportunities are in great demand as investors seek out consistent, riskadjusted returns. But great demand for your business often

More information

BUSINESS-DRIVEN S E C U R I T Y

BUSINESS-DRIVEN S E C U R I T Y BUSINESS-DRIVEN SECURITY MARKET DISRUPTORS Mobile Cloud Big Data Extended Workforce Networked Value Chains APTs Sophisticated Fraud Infrastructure Transformation Less control over access device and back-end

More information

BRIDGING THE GAP OF GRIEF WITH BUSINESS-DRIVEN SECURITY. Mohammad Alazab Enterprise Security Architect

BRIDGING THE GAP OF GRIEF WITH BUSINESS-DRIVEN SECURITY. Mohammad Alazab Enterprise Security Architect BRIDGING THE GAP OF GRIEF WITH BUSINESS-DRIVEN SECURITY Mohammad Alazab Enterprise Security Architect 1 TODAY S SECURITY ISN T WORKING 70% 90% Compromised in the last year 1 80% Are unsatisfied CISO s

More information

Enhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking

Enhanced Cyber Risk Management Standards. Advance Notice of Proposed Rulemaking Draft 11/29/16 Enhanced Cyber Risk Management Standards Advance Notice of Proposed Rulemaking The left column in the table below sets forth the general concepts that the federal banking agencies are considering

More information

FIGHTING FRAUD & CHARGEBACKS 5 STRATEGIES FOR WINNING

FIGHTING FRAUD & CHARGEBACKS 5 STRATEGIES FOR WINNING FIGHTING FRAUD & CHARGEBACKS 5 STRATEGIES FOR WINNING 2 2016 was a strong year for online sales growth. But fraud and chargebacks more than kept pace. The good news? You can dramatically reduce losses

More information

Mantis Partners is a specialist executive search company, servicing the global financial industry, from our offices in London and Hong Kong.

Mantis Partners is a specialist executive search company, servicing the global financial industry, from our offices in London and Hong Kong. Mantis Partners is a specialist executive search company, servicing the global financial industry, from our offices in London and Hong Kong. Working in partnership with our clients to help define their

More information

Advent Direct. Harnessing the power of technology for data management. Tackling the global challenges of fund regulations

Advent Direct. Harnessing the power of technology for data management. Tackling the global challenges of fund regulations October 2013 Advent Direct Harnessing the power of technology for data management Tackling the global challenges of fund regulations Integrated framework for data processing One-stop workflow solution

More information

The Guide to Budgeting for Insider Threat Management

The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management The Guide to Budgeting for Insider Threat Management This guide is intended to help show you how to approach including Insider Threat Management within

More information

ALLFINANZ Digital New Business & Underwriting

ALLFINANZ Digital New Business & Underwriting Digital New Business & Underwriting Transform underwriting into a sales enabler and profit driver Life Group Health Disability www.munichre.com/automation-solutions Digital New Business and Underwriting

More information

A Comprehensive FATCA Solution

A Comprehensive FATCA Solution in collaboration with A Comprehensive FATCA Solution End-to-end automated legal, technology and software solution facilitates global compliance with U.S. Foreign Account Tax Compliance Act requirements

More information

Cyber Risk Quantification: Translating technical risks into business terms

Cyber Risk Quantification: Translating technical risks into business terms Cyber Risk Quantification: Translating technical risks into business terms Jesper Sachmann RSA Denmark 13-06-2018 1 CYBER RISK QUANTIFICATION: TRANSLATING TECHNICAL RISKS INTO BUSINESS TERMS Jesper Sachmann

More information

Early on, your needs were simple. The memory of

Early on, your needs were simple. The memory of Client Guide Early on, your needs were simple. The memory of investing your first hard-earned dollars is etched in your mind. As you established yourself and began to experience success, your needs changed.

More information

Trends Report. Data, Analytics and Risk R I M S

Trends Report. Data, Analytics and Risk R I M S Trends Report Data, Analytics and Risk R I M S 2 0 1 9 Geocoding Synthesizing Crisis Mapping Virtual Reality Machine Analytics The risk landscape is evolving. As a risk manager, you must also evolve, staying

More information

Horse Racing Program. Gaming, Entertainment & Sports Practice

Horse Racing Program. Gaming, Entertainment & Sports Practice Horse Racing Program Gaming, Entertainment & Sports Practice The horse racing industry is facing more risk challenges than ever before. Economic uncertainty, technology advances, increased competition,

More information

Telematics Usage- Based Insurance

Telematics Usage- Based Insurance Telematics Usage- Based Insurance Smart solutions for the motor insurance industry m2m.vodafone.com Vodafone Power to you Telematics Usage-Based Insurance Usage-based insurance Consumers want lower premiums

More information

SUNTRUST PRIVATE WEALTH MANAGEMENT SIGNATURE FINANCIAL ADVICE THAT REFLECTS YOUR INDIVIDUALITY

SUNTRUST PRIVATE WEALTH MANAGEMENT SIGNATURE FINANCIAL ADVICE THAT REFLECTS YOUR INDIVIDUALITY SUNTRUST PRIVATE WEALTH MANAGEMENT SIGNATURE FINANCIAL ADVICE THAT REFLECTS YOUR INDIVIDUALITY BE YOURSELF; EVERYONE ELSE IS ALREADY TAKEN. - OSCAR WILDE Your life, your needs, your dreams and ambitions:

More information

CAPITAL WORKPAPERS TO PREPARED DIRECT TESTIMONY OF GAVIN H. WORDEN ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY BEFORE THE PUBLIC UTILITIES COMMISSION

CAPITAL WORKPAPERS TO PREPARED DIRECT TESTIMONY OF GAVIN H. WORDEN ON BEHALF OF SOUTHERN CALIFORNIA GAS COMPANY BEFORE THE PUBLIC UTILITIES COMMISSION Application of SOUTHERN CALIFORNIA GAS COMPANY for authority to update its gas revenue requirement and base rates effective January 1, 219 (U 94-G) ) ) ) ) Application No. 17-1- Exhibit No.: (SCG-27-CWP)

More information

A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015

A FRAMEWORK FOR MANAGING CYBER RISK APRIL 2015 APRIL 2015 CYBER RISK IS HERE TO STAY Even an unlimited budget for information security will not eliminate your cyber risk. Tom Reagan Marsh Cyber Practice Leader 2 SIMPLIFIED CYBER RISK MANAGEMENT FRAMEWORK

More information

Cyber Insurance I don t think it means what you think it means

Cyber Insurance I don t think it means what you think it means SESSION ID: GRC-T10 Cyber Insurance I don t think it means what you think it means John Loveland Global Head of Cyber Security Strategy & Marketing Verizon Enterprise Solutions Plot A brief history of

More information

Jeffrey A. Slotnick CPP, PSP Ron Worman, The Sage Group The ESRM Commission

Jeffrey A. Slotnick CPP, PSP Ron Worman, The Sage Group The ESRM Commission 1 E N T E R P R I S E S E C U R I T Y R I S K M A N A G E M E N T : A N I N T R O D U C T I O N A N D P R O B L E M B A S E D E X E R C I S E Jeffrey A. Slotnick CPP, PSP Ron Worman, The Sage Group The

More information

Cyber Security Risk Information Sharing Program (CRISP) Overview, Budget Projection and Proposed Funding Allocation

Cyber Security Risk Information Sharing Program (CRISP) Overview, Budget Projection and Proposed Funding Allocation Cyber Security Risk Information Sharing Program (CRISP) Overview, Budget Projection and Proposed Funding Allocation Introduction and Executive Summary This document provides additional background on CRISP,

More information

THE TRANSFORMATION OF INSURANCE

THE TRANSFORMATION OF INSURANCE Allianz Global Corporate & Specialty SE THE TRANSFORMATION OF INSURANCE Insurance Institute of Gauteng Broker Leadership Forum Michele Williams, Head of X S E 17th May 2018 THREE PREDICTIONS FOR THE FUTURE

More information

Control is essential for the attainment of any management objective

Control is essential for the attainment of any management objective Control Control is essential for the attainment of any management objective Control is any process that directs the activities of individuals toward the achievement of organizational goals Characteristics

More information

Risk Management User Guide. Prepared By: Neville Turbit Version Feb /01/2009 Risk Management User Guide Page 1 of 36

Risk Management User Guide. Prepared By: Neville Turbit Version Feb /01/2009 Risk Management User Guide Page 1 of 36 Risk Management User Guide Prepared By: Neville Turbit Version 1.0 1 Feb 09 22/01/2009 Risk Management User Guide Page 1 of 36 Table of Contents Document Origin...2 Change History...2 Risk Guidelines...

More information

Telematics Usage- Based Insurance

Telematics Usage- Based Insurance Telematics Usage- Based Insurance Smart solutions for the motor insurance industry vodafone.com/iot Vodafone Power to you Telematics Usage-Based Insurance Usage-based insurance Consumers want lower premiums

More information

Chapter 2. Objectives

Chapter 2. Objectives Chapter 2 A Systems View and Systems Methodology Objectives Define the systems approach and its impact on project management Define a PMLC and understand how to apply it Define several SDLC models and

More information

Vendor Disclosure Page

Vendor Disclosure Page Vendor Disclosure Page 2017 Thomson Reuters. All rights reserved. Republication or redistribution of Thomson Reuters content, including by framing or similar means, is prohibited without the prior written

More information

The working roundtable was conducted through two interdisciplinary panel sessions:

The working roundtable was conducted through two interdisciplinary panel sessions: As advancements in technology enhance productivity, develop new businesses and enhance economic growth, malicious actors continue to advance as well, seeking to exploit technology for any number of criminal

More information

Business Continuity Program Management Benchmarking Report

Business Continuity Program Management Benchmarking Report Business Continuity Program Management Benchmarking Report SAMPLE REPORT 2017 Prepared by BC Management, Inc. Benchmarking. Plan Ahead. Be Ahead. Table of Contents Reporting History 4 Study Methodology

More information

Best Practices in ENTERPRISE RISK MANAGEMENT. [ Managing Risks Holistically ]

Best Practices in ENTERPRISE RISK MANAGEMENT. [ Managing Risks Holistically ] Best Practices in ENTERPRISE RISK MANAGEMENT [ Managing Risks Holistically ] INTRODUCTIONS MODERATOR: Bob Lipps, JD, CPA PANELISTS: Ron Wilcox Abel Pomar Karen Gordon, Esq. THE EVOLUTION OF RISK Traditional

More information

AIG Crisis Solution Prevention Services

AIG Crisis Solution Prevention Services AIG Crisis Solution Prevention Services AIG Crisis Solution AIG provides its customers with tailored security solutions across a number of risks including kidnap, hijack, detention and extortion. Our

More information

ENTERPRISE RISK MANAGEMENT Mumbai 10 Aug 2018

ENTERPRISE RISK MANAGEMENT Mumbai 10 Aug 2018 ENTERPRISE RISK MANAGEMENT Mumbai 10 Aug 2018 TOPIC : Information & Cyber Security Risk Pawan Chawla CIO & Partner About Lucideus Incubated out of IIT Bombay, we are a pure play cyber security platforms

More information

The importance of regulating in the FinTech s world for the protection of consumers

The importance of regulating in the FinTech s world for the protection of consumers The importance of regulating in the FinTech s world for the protection of consumers Călin Rangu Business Conduct Director, Authority of Financial Supervision Vice-president InsurTech Task Force, EIOPA-European

More information

Cybersecurity Insurance: The Catalyst We've Been Waiting For

Cybersecurity Insurance: The Catalyst We've Been Waiting For SESSION ID: CRWD-W16 Cybersecurity Insurance: The Catalyst We've Been Waiting For Mark Weatherford Chief Cybersecurity Strategist varmour @marktw Agenda Insurance challenges in the market today 10 reasons

More information

Client Risk Solutions Going beyond insurance. Overview

Client Risk Solutions Going beyond insurance. Overview Client Risk Solutions Going beyond insurance Overview For nearly a century AIG has handled millions of business insurance claims throughout the world, giving us a vast storehouse of data and insights across

More information

The role of an actuary in a Policy Administration System implementation

The role of an actuary in a Policy Administration System implementation The role of an actuary in a Policy Administration System implementation Abstract Benefits of a New Policy Administration System (PAS) Insurance is a service and knowledgebased business, which means that

More information

CASUALTY INSURANCE ACE OFFSHORE INSURANCE FOR CONTRACTORS AND SUPPLIERS TO THE OFFSHORE OIL & GAS INDUSTRY

CASUALTY INSURANCE ACE OFFSHORE INSURANCE FOR CONTRACTORS AND SUPPLIERS TO THE OFFSHORE OIL & GAS INDUSTRY CASUALTY INSURANCE ACE OFFSHORE INSURANCE FOR CONTRACTORS AND SUPPLIERS TO THE OFFSHORE OIL & GAS INDUSTRY The offshore oil and gas industry might be mature but it remains dynamic, offering fresh opportunities

More information

Cisco Insurance Whitepaper Fall 2016

Cisco Insurance Whitepaper Fall 2016 White Paper Cisco Insurance Whitepaper Fall 2016 Technology Helps Insurers Unleash the Possibilities of Digitization It s no secret that InsureTech investment is on the rise. According to the Pulse of

More information

CyberMatics SM FAQs. General Questions

CyberMatics SM FAQs. General Questions CyberMatics SM FAQs General Questions What is CyberMatics? Like telematics for auto insurance, CyberMatics is a technology-driven process to help clients understand their current cyber risk as seen by

More information

Investment solutions to help fund your organization s goals

Investment solutions to help fund your organization s goals Outsourced CIO Solutions NON-PROFIT Investment solutions to help fund your organization s goals INVESTED. TOGETHER. Managing your investments isn t your full-time job Every non-profit organization has

More information

Why CISOs Should Embrace Their Cyber Insurer

Why CISOs Should Embrace Their Cyber Insurer 6 Steps to Start Working Together Today Cyber Security risk management is undergoing one of the most important shifts in recent memory; however, this shift is not being driven by the information security

More information

Achieving integrated risk management

Achieving integrated risk management Achieving integrated risk management Performance-driven risk management is a key characteristic of some of the world s most successful companies. 1 Integrated risk management is an essential step in achieving

More information

Final Preliminary Survey Report Audit of Budgeting and Forecasting. June 19, Office of Audit and Evaluation

Final Preliminary Survey Report Audit of Budgeting and Forecasting. June 19, Office of Audit and Evaluation 2013-705 Audit of Budgeting and Forecasting June 19, 2014 Office of Audit and Evaluation TABLE OF CONTENTS INTRODUCTION... 1 BACKGROUND... 1 OBJECTIVE, SCOPE AND APPROACH... 3 RISK ASSESSMENT... 4 PRELIMINARY

More information

2016 Risk Practices Survey

2016 Risk Practices Survey Strong Board. Strong Bank. 2016 Risk Practices Survey MAR 2016 RESEARCH Sponsored by: 2 2016 RISK PRACTICES SURVEY TABLE OF CONTENTS Executive Summary 3 Risk Governance & Oversight 4 Risk Culture & Infrastructure

More information

Sizing the Standalone Commercial Cyber Insurance Market

Sizing the Standalone Commercial Cyber Insurance Market Sizing the Standalone Commercial Cyber Insurance Market Cyber liability is a risk that s rapidly permeating every business that relies on digital technology in some phase of its operations which means

More information

T A B L E of C O N T E N T S

T A B L E of C O N T E N T S INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT THE FIFTH ANNUAL SURVEY ON THE CURRENT STATE OF AND TRENDS IN INFORMATION SECURITY AND CYBER LIABILITY RISK MANAGEMENT Sponsored by October 2015

More information

NZX IPO MASTERCLASS The Wynyard Listing Story. 5 September 2014

NZX IPO MASTERCLASS The Wynyard Listing Story. 5 September 2014 NZX IPO MASTERCLASS The Wynyard Listing Story 5 September 2014 DISCLAIMER The information provided in this document is a guide only and intended for general information purposes. It shall not constitute

More information

Does Your Budgeting Process Lack Accountability?

Does Your Budgeting Process Lack Accountability? Does Your Budgeting Process Lack Accountability? How effectively you monitor variances will tell you by Jeff Goldstein and Jay Spence Nearly every healthcare provider today is working to reduce or in some

More information

CITY OF VILLA PARK The Hidden Jewel

CITY OF VILLA PARK The Hidden Jewel CITY OF VILLA PARK The Hidden Jewel 2017 2022 STRATEGIC PLAN December 2017 TABLE OF CONTENTS Introduction. 2 Importance of Strategic Planning to the City of Villa Park.... 3 Executive Summary.. 4 Foundation

More information

Cyber Security Liability:

Cyber Security Liability: www.mcgrathinsurance.com Cyber Security Liability: How to protect your business from a cyber security threat or breach. 01001101011000110100011101110010011000010111010001101000001000000100100101101110011100110111

More information

Trial by fire* Protected. But under pressure to perform

Trial by fire* Protected. But under pressure to perform Key findings from the 2010 Global State of Information Security Survey Financial Services Trial by fire* Protected. But under pressure to perform What global executives expect of information security In

More information

Guidewire ClaimCenter. Adapt and succeed

Guidewire ClaimCenter. Adapt and succeed Guidewire ClaimCenter Adapt and succeed Today s Challenge It s a fact that claims handling accounts for your highest cost. It also presents your greatest opportunity for satisfying customers and securing

More information

THE F FILES. Group benefits fraud what you need to know to fight fraud GET #FRAUDSMART

THE F FILES. Group benefits fraud what you need to know to fight fraud GET #FRAUDSMART THE F FILES Group benefits fraud what you need to know to fight fraud GET #FRAUDSMART SPRING 2018 LOOKING INTO THE FUTURE OF FRAUD WITH PREDICTIVE ANALYTICS Big data it is fundamental in the fight against

More information

Optimizing the actuarial modeling environment

Optimizing the actuarial modeling environment Optimizing the actuarial modeling environment Actuarial IT architecture considerations around loose and tight coupling By Tim Pauza, William Cember and Sanjo Yogiaveedu Introduction Working with models

More information

The future of operational risk in financial services A new approach to operational risk capital management

The future of operational risk in financial services A new approach to operational risk capital management The future of operational risk in financial services A new approach to operational risk capital management 02 The future of operational risk in financial services A new approach to operational risk capital

More information

Risk Management: Assessing and Controlling Risk

Risk Management: Assessing and Controlling Risk Risk Management: Assessing and Controlling Risk Introduction Competitive Disadvantage To keep up with the competition, organizations must design and create a safe environment in which business processes

More information

THE FIS READINESS REPORT. The Hunt for Growth Across the Insurance Industry. Are you ready to rise?

THE FIS READINESS REPORT. The Hunt for Growth Across the Insurance Industry. Are you ready to rise? THE FIS READINESS REPORT The Hunt for Growth Across the Insurance Industry Are you ready to rise? 1 Contents 3 Introduction 4 Headline findings 6 FIS Readiness Index 11 Strengthening automation 12 Mastering

More information

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017

You ve been hacked. Riekie Gordon & Roger Truebody & Alexandra Schudel. Actuarial Society 2017 Convention October 2017 You ve been hacked Riekie Gordon & Roger Truebody & Alexandra Schudel Why should you care? U$4.6 - U$121 billion - Lloyds U$45 billion not covered 2 The plot thickens 2016 Barkly Survey: It s a business

More information

Why maintenance budgets matter

Why maintenance budgets matter Empowering ERP Asset Management Solutions Why maintenance budgets matter The Alcoa journey to improve costs, reliability, and knowledge transfer By Scott Gorsuch and Rob Carpio Alcoa Inc. Sean Licata VIZIYA

More information

Sponsored by. Is Your Data Safe? The 2016 Financial Adviser Cybersecurity Assessment

Sponsored by. Is Your Data Safe? The 2016 Financial Adviser Cybersecurity Assessment Sponsored by Is Your Data Safe? The 2016 Financial Adviser Cybersecurity Assessment Table of Contents Welcome 3 Executive Summary 4 Introduction and Methodology 6 Preparation and Readiness 8 - Client Awareness

More information

The Smartest Employee Benefit Is Identity Theft Management

The Smartest Employee Benefit Is Identity Theft Management The Smartest Employee Benefit Is Identity Theft Management HELP PROTECT YOUR EMPLOYEES. Proposal For: Date: Presented By: Provide peace of mind. Raise your benefits to a new level. Every employee has a

More information

Business Continuity: Be Assured

Business Continuity: Be Assured Business Continuity: Be Assured CATCH THE WAVE The world is changing by the minute, both your organization and external forces. It s time for a different approach. Be aware, be engaged, or be swept away.

More information

Approved Business Plan and Budget. Florida Reliability Coordinating Council, Inc.

Approved Business Plan and Budget. Florida Reliability Coordinating Council, Inc. Approved 2015 Business Plan and Budget Florida Reliability Coordinating Council, Inc. Approved: 6/25/2014 Table of Contents Introduction... 3 Organizational Overview... 3 Membership and Governance... 4

More information

Cybersecurity Insurance: New Risks and New Challenges

Cybersecurity Insurance: New Risks and New Challenges SESSION ID: SDS1-F01 Cybersecurity Insurance: New Risks and New Challenges Mark Weatherford Chief Cybersecurity Strategist varmour @marktw The cybersecurity market in the Asia Pacific region contributes

More information

Morningstar. Managed PortfoliosSM. Mutual Fund Portfolios. ETF Portfolios. Select Stock Baskets

Morningstar. Managed PortfoliosSM. Mutual Fund Portfolios. ETF Portfolios. Select Stock Baskets Morningstar Managed PortfoliosSM Mutual Fund Portfolios ETF Portfolios Select Stock Baskets A Team You Can Trust The Insight of Your Financial Advisor, The Strength of Morningstar At Morningstar Investment

More information

How to Choose a Total Chargeback Management Provider

How to Choose a Total Chargeback Management Provider How to Choose a Total Chargeback Management Provider Chargebacks impact all types of merchants physical goods, recurring, digital goods merchants to the tune of $40 billion every year. This problem continues

More information

2016 Second Quarter Earnings Conference Call

2016 Second Quarter Earnings Conference Call 2016 Second Quarter Earnings Conference Call Jeffrey T. Gill President & CEO Anthony C. Allen Vice President & CFO August 17, 2016 Safe Harbor Disclosure Non-GAAP Financial Measures Any non-gaap measures,

More information

Is your Schedule Ready for the 14-Point DCMA Assessment?

Is your Schedule Ready for the 14-Point DCMA Assessment? Is your Schedule Ready for the 14-Point DCMA Assessment? By Dr. Mohamed Hegab, PE, PMP Executive Vice President November 2010 Copyright 2010 EyeDeal Tech. All rights reserved. This document and translations

More information

Early on, your needs were simple. The memory of

Early on, your needs were simple. The memory of Client Guide Early on, your needs were simple. The memory of investing your first hard-earned dollars is etched in your mind. As you established yourself and began to experience success, your needs changed.

More information

Compliance, Efficiency, and Growth in Cross- Border Trade kpmg.com

Compliance, Efficiency, and Growth in Cross- Border Trade kpmg.com TRADE & CUSTOMS SERVICES Compliance, Efficiency, and Growth in Cross- Border Trade kpmg.com 1 Compliance, Efficiency, and Growth in Cross-Border Trade Meeting the challenges, realizing the benefits of

More information

COMPANY OVERVIEW. February 7, 2019

COMPANY OVERVIEW. February 7, 2019 COMPANY OVERVIEW February 7, 2019 1 DISCLAIMERS This presentation contains forward-looking statements. All statements contained in this presentation other than statements of historical facts, including,

More information

2015 Letter to Our Shareholders

2015 Letter to Our Shareholders 2015 Letter to Our Shareholders 1 From Our Chairman & CEO Pierre Nanterme DELIVERING IN FISCAL 2015 Accenture s excellent fiscal 2015 financial results reflect the successful execution of our strategy

More information

Access to this webinar is for educational and informational purposes only. Consult a licensed broker or registered investment advisor before placing

Access to this webinar is for educational and informational purposes only. Consult a licensed broker or registered investment advisor before placing Access to this webinar is for educational and informational purposes only. Consult a licensed broker or registered investment advisor before placing any trade. All securities and orders discussed are tracked

More information

Alternative Credit Scores: The Key to Financial Inclusion for Consumers

Alternative Credit Scores: The Key to Financial Inclusion for Consumers WHITEPAPER Alternative Credit Scores: The Key to Financial Inclusion for Consumers May 2017 WHITEPAPER Alternative Credit Scores: The Key to Financial Inclusion for Consumers May 2017 Executive summary

More information

Grow your business 2016 Issue 09

Grow your business 2016 Issue 09 2016 ISSUE 09 CONTENTS How to pay too much income tax on the sale of your business. Consider these marketing priorities to grow your profit. Business succession is not just the seller s issue. How to pay

More information

OTC Derivatives Valuation and Data Services Technology-enabled solutions for derivatives and complex instruments

OTC Derivatives Valuation and Data Services Technology-enabled solutions for derivatives and complex instruments OTC Derivatives Valuation and Data Services Technology-enabled solutions for derivatives and complex instruments Gain the clearest view into OTC derivatives markets Capitalize on the industry s highest

More information

Attract and retain more high-quality customers while reducing your risks.

Attract and retain more high-quality customers while reducing your risks. HOW TO ASSESS THE CREDIT RISK OF NEW IMMIGRANTS Attract and retain more high-quality customers while reducing your risks. EXECUTIVE SUMMARY With approximately 250, new immigrants arriving in Canada every

More information

Digital evolution transforms the insurance. Christof Mascher KBW London / 3 March 2016

Digital evolution transforms the insurance. Christof Mascher KBW London / 3 March 2016 Digital evolution transforms the insurance Christof Mascher KBW London / 3 March 2016 The digital business model: Enhanced capabilities at the customer interface and along the entire value chain Identified

More information

FIS INSURANCE PROCESS CONTROLLER SYSTEM INTEGRATION, PROCESS AUTOMATION AND COMPOSITE APPLICATION PLATFORM

FIS INSURANCE PROCESS CONTROLLER SYSTEM INTEGRATION, PROCESS AUTOMATION AND COMPOSITE APPLICATION PLATFORM FIS INSURANCE PROCESS CONTROLLER SYSTEM INTEGRATION, PROCESS AUTOMATION AND COMPOSITE APPLICATION PLATFORM FIS Insurance Process Controller 1 Empowering a new age of insurance Unrelenting regulatory change

More information

It can be achieved... Built by Predictive Modelers for Predictive Modelers TM

It can be achieved... Built by Predictive Modelers for Predictive Modelers TM Built by Predictive Modelers for Predictive Modelers TM Attaining growth in a concentrated market Finding and capitalizing on opportunity Creating competitive advantage It can be achieved... FIGHTING FOR

More information

Nonprofit Budgeting Part 2: Building Better Budgets

Nonprofit Budgeting Part 2: Building Better Budgets Nonprofit Budgeting Part 2: Building Better Budgets CompassPoint Nonprofit Services 500 12 th Street Suite 320 Oakland, CA 94607 ph 510-318-3755 fax 415-541-7708 web: www.compasspoint.org e-mail: workshops@compasspoint.org

More information

Get Smarter. Data Analytics in the Canadian Life Insurance Industry. Introduction. Highlights. Financial Services & Insurance White Paper

Get Smarter. Data Analytics in the Canadian Life Insurance Industry. Introduction. Highlights. Financial Services & Insurance White Paper Get Smarter Data Analytics in the Canadian Life Industry Highlights Several key findings emerged from the SMA research: The primary focus for sophisticated analytics in L&A has traditionally been in the

More information

Procurement reporting alignment kpmg.com

Procurement reporting alignment kpmg.com Business Effectiveness Procurement reporting alignment kpmg.com 1 Procurement reporting alignment Procurement as a function is on a journey toward greater importance and influence. As it evolves beyond

More information

Pension Scheme Cyber Resilence Workshop

Pension Scheme Cyber Resilence Workshop Pension Scheme Cyber Resilence Workshop Cyber Resilience Workshop Pension schemes hold substantial amounts of personal data, have regular financial transactions, and are managed by trustees who often

More information

Optimism for new investment strategies. proven value. Alternatives. The Alpha Game. Hedge Funds Step Up Operations to Capture New Growth

Optimism for new investment strategies. proven value. Alternatives. The Alpha Game. Hedge Funds Step Up Operations to Capture New Growth Optimism for 2020 new investment strategies proven value Alternatives The Alpha Game Hedge Funds Step Up Operations to Capture New Growth 63 % expect institutional investors will increase their exposure

More information

Federal Banking Agencies Request Comment on Enhanced Cybersecurity Standards

Federal Banking Agencies Request Comment on Enhanced Cybersecurity Standards Federal Banking Agencies Request Comment on Enhanced Cybersecurity Standards October 20, 2016 Financial Institutions, Cybersecurity On October 19, 2016, the Board of Governors of the Federal Reserve System

More information

people and culture are key to our success

people and culture are key to our success april 2018 dear fellow shareholders, 2017 capped Morgan Stanley s journey through a multi-decade period of challenges and recovery. By transforming our business mix and risk profile, and embracing the

More information

OPENING THE GATEWAY TO A SMART INSURANCE FUTURE WITH DIGITAL

OPENING THE GATEWAY TO A SMART INSURANCE FUTURE WITH DIGITAL PERSPECTIVE OPENING THE GATEWAY TO A SMART INSURANCE FUTURE WITH DIGITAL Mahfuj Munshi Abstract The insurance industry is in a state of flux. It is undergoing a transformation with strong undercurrents

More information

DEBUNKING MYTHS FOR CYBER INSURANCE

DEBUNKING MYTHS FOR CYBER INSURANCE SESSION ID: GRC-F02 DEBUNKING MYTHS FOR CYBER INSURANCE Robert Jones Global Head of Financial Lines Specialty Claims AIG Garin Pace Cyber Product Leader AIG @Garin_Pace Introduction What Is Cyber Insurance?

More information

HAVE A GOAL START EARLY BE RESILIENT. To achieve a larger purpose. To reach your goals. Through highs and lows.

HAVE A GOAL START EARLY BE RESILIENT. To achieve a larger purpose. To reach your goals. Through highs and lows. Marathon Fever The Marathon fever has caught the fancy of general citizens over the last few years. With increasing participation, there has also been an appreciation of the running culture. It is no longer

More information

The Risk of Economic Crime

The Risk of Economic Crime The Risk of Economic Crime 0 ACFE European Fraud Conference London, March 7, 0 GROUP SECURITY HERE TO PROTECT OUR WORLD Torsten Wolf Group Head of Crime and Fraud Prevention Agenda Introduction Economic

More information

Real-time Driver Profiling & Risk Assessment for Usage-based Insurance with StreamAnalytix

Real-time Driver Profiling & Risk Assessment for Usage-based Insurance with StreamAnalytix Real-time Driver Profiling & Risk Assessment for Usage-based Insurance with StreamAnalytix The auto insurance industry is rising up to meet consumer expectations of personalization and flexibility in all

More information

HITRUST CSF Assurance Program. Simplifying the information protection of healthcare data

HITRUST CSF Assurance Program. Simplifying the information protection of healthcare data HITRUST CSF Assurance Program Simplifying the information protection of healthcare data May 2013 Table of Contents Background CSF Assurance Program Overview Compliance Challenges Key Components of the

More information

At the Heart of Cyber Risk Mitigation

At the Heart of Cyber Risk Mitigation At the Heart of Cyber Risk Mitigation De-risking Cyber Threats with Insurance Vikram Singh Abstract Management of risks is an integral part of the insurance industry. Companies have succeeded in identifying

More information

Changing the game. Key findings from The Global State of Information Security Survey 2013

Changing the game. Key findings from The Global State of Information Security Survey 2013 www.pwc.com/security Changing the game While tight budgets have forestalled updates to security programs, many businesses are confident they re winning the game. But the rules and the players have changed.

More information

Integrated Cost-Schedule Risk Analysis Improves Cost Contingency Calculation ICEAA 2017 Workshop Portland OR June 6 9, 2017

Integrated Cost-Schedule Risk Analysis Improves Cost Contingency Calculation ICEAA 2017 Workshop Portland OR June 6 9, 2017 Integrated Cost-Schedule Risk Analysis Improves Cost Contingency Calculation ICEAA 2017 Workshop Portland OR June 6 9, 2017 David T. Hulett, Ph.D., FAACE Hulett & Associates, LLC David.hulett@projectrisk

More information

Catastrophe Models: Learning from Superstorm Sandy

Catastrophe Models: Learning from Superstorm Sandy Catastrophe Models: Learning from Superstorm Sandy January 2013 Lockton Companies Although Superstorm Sandy was only a Category 1 hurricane, it made landfall on October 29 as the largest Atlantic hurricane

More information

Using data mining to detect insurance fraud

Using data mining to detect insurance fraud IBM SPSS Modeler Using data mining to detect insurance fraud Improve accuracy and minimize loss Highlights: combines powerful analytical techniques with existing fraud detection and prevention efforts

More information