SlideShare uma empresa Scribd logo
1 de 42
Perpetuity Research & Consultancy International (PRCI) Ltd
www.perpetuityresearch.com
Tackling Cyber Crime: TheTackling Cyber Crime: The
Role of Private SecurityRole of Private Security
Professor Martin GillProfessor Martin Gill
m.gill@perpetuityresearch.comm.gill@perpetuityresearch.com
SRI MembersSRI Members
The focusThe focus
 Understanding the role of privateUnderstanding the role of private
security in tackling cyber crimesecurity in tackling cyber crime
 A lot of cyber-security expertise is inA lot of cyber-security expertise is in
the private sector – how do responsesthe private sector – how do responses
to cyber crime reflect this?to cyber crime reflect this?
 What constitutes cyber crime?What constitutes cyber crime?
DefinitionDefinition
 Definitions typically focus, to a lesser
or greater extent, on whether offences
are cyber dependent, cyber enabled,
or cyber assisted
 In practice, cyber crime involves a
wide variety of offences, some are
routine and a nuisance and some are
serious and can require a wide variety
of skill sets to manage
DefinitionDefinition
 UK GovernmentUK Government
‘illegal activities undertaken by criminals
for financial gain which exploit
vulnerabilities in the use of the internet
and other electronic systems to illicitly
access or attack information and
services used by citizens, business
and the Government’
Cyber security in perspectiveCyber security in perspective
 People, not least security staff, arePeople, not least security staff, are
crucial to protecting against cyber losscrucial to protecting against cyber loss
although this is often undervalued andalthough this is often undervalued and
under-statedunder-stated
 Considerable overlap between goodConsiderable overlap between good
cyber security and good overall securitycyber security and good overall security
 Adequate cyber response requiresAdequate cyber response requires
agencies to work togetheragencies to work together
ImportanceImportance
 Much of the infrastructure that
underpins cyberspace is owned and
maintained by different elements of
the private sector; inevitably it is
business that will need to take a
leading role in offering protection
ConsequencesConsequences
 Loss of sales
 Fall in stocks and share prices
 Loss of profit
 Adverse media coverage
 Higher employee turnover
 Key staff/talent retention issues
 Employee disengagement and
dissatisfaction
ConsequencesConsequences
 A drop in consumer confidence
 The loss of suppliers or sales
 Reduction in influence of the
organisation on policy-makers in their
sector/industry
 The costs and complications of
managing recovery and improving
resilience after a cyber attack
Clash of culturesClash of cultures
 ‘IT security requires technical
expertise but not large numbers of
staff, whereas physical security
generally has the opposite’ (Tyson)
ContextContext
 Police are often relatively minorPolice are often relatively minor
playersplayers
 Police sometimes lack trust in otherPolice sometimes lack trust in other
partners (including members of publicpartners (including members of public
and online community)and online community)
 Police face problems – lack ofPolice face problems – lack of
technical skill, disjointed approach,technical skill, disjointed approach,
insufficient resources, poorinsufficient resources, poor
understanding of cyber spaceunderstanding of cyber space
ResearchingResearching
 A survey was conducted of securityA survey was conducted of security
professionals from around the worldprofessionals from around the world
 Follow-up one-to-one interviews withFollow-up one-to-one interviews with
physical and cyber security specialistsphysical and cyber security specialists
ResearchResearch
 Research addressed 4 key areas:Research addressed 4 key areas:
– The current approach to managingThe current approach to managing
cyber securitycyber security
– The relevance of convergenceThe relevance of convergence
between physical and cyber securitybetween physical and cyber security
– Perspectives on law enforcementPerspectives on law enforcement
– The potential role of private securityThe potential role of private security
in responding to cyber crimein responding to cyber crime
The current approach to managingThe current approach to managing
cyber securitycyber security
 88% of respondents agreed that88% of respondents agreed that
organisations were poor at preventingorganisations were poor at preventing
cyber crimecyber crime
 63% of respondents agreed that63% of respondents agreed that
organisations were poor in knowingorganisations were poor in knowing
when there had been a breach ofwhen there had been a breach of
securitysecurity
QuotesQuotes
 ‘Our clients, in most cases at least, don’t
see the threat of cyber, it is not visible, they
would have to be shown something to
notice’. Head of Security, Construction
  ‘It is not well understood, I work with start
ups as well as multi-national companies,
and on the whole, they think it will not
happen to them. There is a lack lustre
attitude, it baffles me…Security is not an
easy sell.’ Consultant, Website
Development
People matterPeople matter
 45% believed that cyber and physical45% believed that cyber and physical
security were equally important in thesecurity were equally important in the
companies they were linked tocompanies they were linked to
 55% agreed that people issues were55% agreed that people issues were
more important than technology inmore important than technology in
tackling cyber crimetackling cyber crime
 81% agreed that an alert workforce81% agreed that an alert workforce
was the best defence against cyberwas the best defence against cyber
crimecrime
QuoteQuote
 ‘The humans, all of your staff are your
most effective line of defence.
Technology is a critical part’. Head of
Cyber Resilience, Security Supplier
 You could have all the technical
security solutions in the world and all it
takes is the human factor to create risk
and introduce a threat’. On-line surveyOn-line survey
ConvergenceConvergence
‘Security convergence is the integration,
in a formal, collaborative, and strategic
manner, of the cumulative security
resources of an organisation in order to
deliver enterprise-wide benefits through
enhanced risk mitigation, increased
operational effectiveness and efficiency,
and cost savings’ (Tyson)
The relevance of convergenceThe relevance of convergence
between physical and cyber securitybetween physical and cyber security
 Considerable support for the idea ofConsiderable support for the idea of
convergenceconvergence
– 56% argued for some type of56% argued for some type of
converged working, 38% for separateconverged working, 38% for separate
teams, 6% not sureteams, 6% not sure
 More research needed to translate theoryMore research needed to translate theory
into practice and understand differentinto practice and understand different
models/approaches of convergencemodels/approaches of convergence
The relevance of convergenceThe relevance of convergence
between physical and cyber securitybetween physical and cyber security
 29% of respondents agreed that bringing29% of respondents agreed that bringing
together physical and cyber securitytogether physical and cyber security
specialists was widely understood inspecialists was widely understood in
relation to securityrelation to security
 35% felt that physical security experts did35% felt that physical security experts did
not want to get involved in cyber securitynot want to get involved in cyber security
 56% felt that cyber security personnel did56% felt that cyber security personnel did
not want physical security experts involvednot want physical security experts involved
in ’their’ areain ’their’ area
QuoteQuote
 ‘In fact, more and more they are the
same place, as in physical security we
are moving towards the same
assessments and policies and we are
working in the same direction, in a
couple of years we will merge’.
Security Manager (Physical), Bank
QuoteQuote
 ‘I follow the same risk assessment and
risk evaluation process. They may
require different skill sets to get under
the skin of threats and the availability
and effectiveness of controls, but
broad resilience risk management
should follow the same thought
process’. Head of Resilience, Utilities
QuoteQuote
 ‘If you have a cyber attack there is
often a physical element to it, a
demand or a ransom for example, so it
will soon become a ransom
management project; information is a
valuable asset after all, and these
offenders know that’. Security
Manager, Service Provider
BarriersBarriers
 Barriers commonly thought of asBarriers commonly thought of as
coming between physical security andcoming between physical security and
cyber threats were:cyber threats were:
– The belief that cyber is outside theThe belief that cyber is outside the
remit of physical securityremit of physical security
– The lack of cyber expertise amongstThe lack of cyber expertise amongst
physical security expertsphysical security experts
– Belief that cyber specialistsBelief that cyber specialists
generally operate in isolationgenerally operate in isolation
QuoteQuote
 The advantage of being separate is
about skills sets, about being able to
dedicate a focus to professionals in
their dedicated sphere rather than
being seen as a one-stop-shop’.
Security Manager, Energy provider
QuoteQuote
 ‘The biggest difference that I experience –
we have about 150 offices and they all look
different – different types of buildings,
different security – I have to achieve security
in all those places. The cyber folks – when
they go to address something on a network,
they are doing the same thing everywhere –
the network looks the same everywhere, the
computers look the same’. Director of
Physical Security, risk management
company
QuoteQuote
 ‘When looking at physical and cyber there is
a difference. When something goes wrong
what is harmful? In the case of physical
security human beings can get hurt, if cyber
goes wrong no one will get physically hurt,
no one will die unless a cyber attacker
hacks hospitals, so outcomes of risks are
different, with physical you can die with
cyber the harm is more financially’. Global
Security Director, Security Supplier.
ConvergenceConvergence
 Although then a lot of support thereAlthough then a lot of support there
are concerns and the clash of culturesare concerns and the clash of cultures
is worthy of special commentis worthy of special comment
QuoteQuote
 In physical they are pretty much driven to be
physically dominant, alpha personalities,
physical control over physical space and by
and large info security services people don’t
have that cultural approach, they are geeky,
introverted focused on their technologies
and how they can be used, and they tend
not to be very physical people’. Cyber
Security Partnership Manager
Perspectives on lawPerspectives on law
enforcementenforcement
 3% respondents strongly agreed that3% respondents strongly agreed that
the police are effective at tacklingthe police are effective at tackling
cyber crimecyber crime
 4% thought they were experts in this4% thought they were experts in this
areaarea
 18% agreed that police are effective at18% agreed that police are effective at
tackling cyber crimetackling cyber crime
QuoteQuote
 ‘They don’t understand it. They don’t
have the resources. They see it as a
business issue. Stealing data from a
business is not seen as a crime, it’s
seen…as a crime against business,
not society’. Director of Physical
Security, Risk Management Company
QuoteQuote
 ‘Companies report incidents but never get
feedback and it is the same for the
intelligence services; when we report
intelligence, say about spamming, we send
reports and call friends and contacts but we
get no feedback. Only one side
communication; we give but we don’t
receive. Everyone speaks about public and
private partnership and it is only one way’.
Security Manager (Physical), Bank
Law enforcementLaw enforcement
 69% of those who expressed an69% of those who expressed an
opinion either way agreed that it isopinion either way agreed that it is
impractical to report all cyber crimeimpractical to report all cyber crime
 General view that the scale of cyberGeneral view that the scale of cyber
offending and depletion of resourcesoffending and depletion of resources
available to police meantavailable to police meant
organisations will have to takeorganisations will have to take
responsibility for protectingresponsibility for protecting
themselvesthemselves
QuoteQuote
 ‘The police need to set up an effective
response to cyber crime, this means
being agile and flexible; they need to
be able to move quickly. They need to
think in a different paradigm’.
Corporate Head of Security, Retail
The potential role of private securityThe potential role of private security
in responding to cyber crimein responding to cyber crime
 52% respondents agreed that any52% respondents agreed that any
approach to cyber that didn’t include aapproach to cyber that didn’t include a
physical response was therefore weakphysical response was therefore weak
 79% thought that physical security79% thought that physical security
was crucial to tackling cyberwas crucial to tackling cyber
Thinking about the physicalThinking about the physical
 38% agreed physical security38% agreed physical security
suppliers often don’t see opportunitiessuppliers often don’t see opportunities
for contributing to cyber securityfor contributing to cyber security
 52% felt that manned guarding52% felt that manned guarding
companies could make a contribution,companies could make a contribution,
38% thought facilities management38% thought facilities management
companies could, 91% thoughtcompanies could, 91% thought
security consultants couldsecurity consultants could
QuoteQuote
 ‘[there are] lots of opportunities for a
bold security company [to] be a bit of a
disrupter, and maybe they have to
employ different people, and pay
more, the size of the prize is high: any
dinosaur that isn’t adapting might
struggle justifying what they do with
the current group of people’. Head of
Resilience, Utilities
Overall commentsOverall comments
 Physical security has generally underplayedPhysical security has generally underplayed
the contribution it can make to tackling cyberthe contribution it can make to tackling cyber
crimecrime
 Some felt that by not engaging in this area, itSome felt that by not engaging in this area, it
was missing an opportunity to influence andwas missing an opportunity to influence and
profit from this workprofit from this work
 There is a mistaken tendency to see theThere is a mistaken tendency to see the
response to cyber crime in terms ofresponse to cyber crime in terms of
technologytechnology
 Convergence is widely discussed but there’sConvergence is widely discussed but there’s
a lack of clarity as to what this meansa lack of clarity as to what this means
CommentsComments
 Police have an important role to play, butPolice have an important role to play, but
there needs to be more awareness aboutthere needs to be more awareness about
what can be realistically expectedwhat can be realistically expected
 Cost of technical cyber response can beCost of technical cyber response can be
high and this excludes many companieshigh and this excludes many companies
from being able to afford what they need.from being able to afford what they need.
 Cyber threats are relatively new andCyber threats are relatively new and
security and policing worlds are only nowsecurity and policing worlds are only now
beginning to determine the merits ofbeginning to determine the merits of
different approachesdifferent approaches
More informationMore information
 To obtain a copy of the reportTo obtain a copy of the report
((Tackling Cyber Crime: The Role of
Private Security) and other reports goand other reports go
to:to:
 www.perpetuityresearch.comwww.perpetuityresearch.com
Recognising OutstandingRecognising Outstanding
PerformersPerformers
 For information on a new worldwideFor information on a new worldwide
scheme recognising those who arescheme recognising those who are
excellent at what they do, go to:excellent at what they do, go to:
 www.theospas.comwww.theospas.com
Perpetuity Research & Consultancy International (PRCI) Ltd
www.perpetuityresearch.com
Tackling Cyber Crime: TheTackling Cyber Crime: The
Role of Private SecurityRole of Private Security
Professor Martin GillProfessor Martin Gill
m.gill@perpetuityresearch.comm.gill@perpetuityresearch.com

Mais conteúdo relacionado

Mais procurados

What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 servicesCade Zvavanjanja
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceSymantec
 
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...South Tyrol Free Software Conference
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceDarren Argyle
 
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience InsuranceAccenture Insurance
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof SoodZsolt Nemeth
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecXavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecLaura Tibbo
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsColleen Beck-Domanico
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseWilliam McBorrough
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Dawn Yankeelov
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityShareDocView.com
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesTripwire
 

Mais procurados (20)

What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Gainful Information Security 2012 services
Gainful Information Security 2012 servicesGainful Information Security 2012 services
Gainful Information Security 2012 services
 
A Manifesto for Cyber Resilience
A Manifesto for Cyber ResilienceA Manifesto for Cyber Resilience
A Manifesto for Cyber Resilience
 
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
 
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
Sean McCloskey: How do we Strengthen the Public-Private Partnership to Mitiga...
 
Brochure - Jan 14
Brochure - Jan 14Brochure - Jan 14
Brochure - Jan 14
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House CounselAdam Palmer: Managing Advanced Cyber Threats for In-House Counsel
Adam Palmer: Managing Advanced Cyber Threats for In-House Counsel
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
Hakin9 interview w Prof Sood
Hakin9 interview w Prof SoodHakin9 interview w Prof Sood
Hakin9 interview w Prof Sood
 
Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1Gill_Pat.2016.Resume.CISO.1
Gill_Pat.2016.Resume.CISO.1
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 DecXavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
Xavier Marguinaud in Corporate Livewire Cyber Security Expert Guide 2017 Dec
 
Cyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial InstitutionsCyber Security Tips and Resources for Financial Institutions
Cyber Security Tips and Resources for Financial Institutions
 
No National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law PleaseNo National 'Stand Your Cyberground' Law Please
No National 'Stand Your Cyberground' Law Please
 
Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity Shaping Your Future in Banking Cybersecurity
Shaping Your Future in Banking Cybersecurity
 
Cyber999 Brochure
Cyber999 BrochureCyber999 Brochure
Cyber999 Brochure
 
Leveraging Board Governance for Cybersecurity
Leveraging Board Governance for CybersecurityLeveraging Board Governance for Cybersecurity
Leveraging Board Governance for Cybersecurity
 
Improving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & ExecutivesImproving Cyber Security Literacy in Boards & Executives
Improving Cyber Security Literacy in Boards & Executives
 

Destaque

Aegon Fact Sheet Flexible Retirement in Australia
Aegon Fact Sheet Flexible Retirement in AustraliaAegon Fact Sheet Flexible Retirement in Australia
Aegon Fact Sheet Flexible Retirement in AustraliaAegon
 
Relevance of odl for rural development final
Relevance of odl for rural development finalRelevance of odl for rural development final
Relevance of odl for rural development finalritimoni
 
Products made in russia 1808 (catalog)
Products made in russia 1808 (catalog)Products made in russia 1808 (catalog)
Products made in russia 1808 (catalog)Ryan Wright
 
Suspension system for any vehicle
Suspension system for any vehicleSuspension system for any vehicle
Suspension system for any vehicleStudy Hub
 
Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...
Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...
Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...IOSR Journals
 

Destaque (6)

Aegon Fact Sheet Flexible Retirement in Australia
Aegon Fact Sheet Flexible Retirement in AustraliaAegon Fact Sheet Flexible Retirement in Australia
Aegon Fact Sheet Flexible Retirement in Australia
 
Luis duquela
Luis duquelaLuis duquela
Luis duquela
 
Relevance of odl for rural development final
Relevance of odl for rural development finalRelevance of odl for rural development final
Relevance of odl for rural development final
 
Products made in russia 1808 (catalog)
Products made in russia 1808 (catalog)Products made in russia 1808 (catalog)
Products made in russia 1808 (catalog)
 
Suspension system for any vehicle
Suspension system for any vehicleSuspension system for any vehicle
Suspension system for any vehicle
 
Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...
Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...
Car Dynamics Using Quarter Model and Passive Suspension, Part III: A Novel Po...
 

Semelhante a Professor Martin Gill, Director, Perpetuity Research

Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraLuke Farrell
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesJoseph DeFever
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdftrellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdfw2sdvzdjtz
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts finalDaren Dunkel
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCBIZ, Inc.
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromiseCMR WORLD TECH
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementDaren Dunkel
 
Securing the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfSecuring the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfAltius IT
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityMatthew Rosenquist
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Booz Allen Hamilton
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report Bricata, Inc.
 

Semelhante a Professor Martin Gill, Director, Perpetuity Research (20)

Priming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive eraPriming your digital immune system: Cybersecurity in the cognitive era
Priming your digital immune system: Cybersecurity in the cognitive era
 
Cybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & PracticesCybersecurity: Perceptions & Practices
Cybersecurity: Perceptions & Practices
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdftrellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
trellix-mind-of-the-ciso-report-ebook-behind-the-breach.pdf
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Cyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measuresCyber Security: Why your business needs protection & prevention measures
Cyber Security: Why your business needs protection & prevention measures
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Getting ahead of compromise
Getting ahead of compromiseGetting ahead of compromise
Getting ahead of compromise
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Sem 001 sem-001
Sem 001 sem-001Sem 001 sem-001
Sem 001 sem-001
 
A CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk ManagementA CIRO's-eye view of Digital Risk Management
A CIRO's-eye view of Digital Risk Management
 
Securing the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdfSecuring the digital frontier cyber security policies for a safer future.pdf
Securing the digital frontier cyber security policies for a safer future.pdf
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Pivotal Role of HR in Cybersecurity
Pivotal Role of HR in CybersecurityPivotal Role of HR in Cybersecurity
Pivotal Role of HR in Cybersecurity
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
The top challenges to expect in network security in 2019 survey report
The top challenges to expect in network security in 2019  survey report The top challenges to expect in network security in 2019  survey report
The top challenges to expect in network security in 2019 survey report
 

Mais de CSSaunders

Public Safety and Security in the 21st Century
Public Safety and Security in the 21st CenturyPublic Safety and Security in the 21st Century
Public Safety and Security in the 21st CenturyCSSaunders
 
Spreading innovation and learning: the role of the College of Policing
Spreading innovation and learning: the role of the College of PolicingSpreading innovation and learning: the role of the College of Policing
Spreading innovation and learning: the role of the College of PolicingCSSaunders
 
Driving innovation with technology
Driving innovation with technologyDriving innovation with technology
Driving innovation with technologyCSSaunders
 
How to think and act like a public entrepreneur
How to think and act like a public entrepreneurHow to think and act like a public entrepreneur
How to think and act like a public entrepreneurCSSaunders
 
Police culture and the psychology of fear
Police culture and the psychology of fear Police culture and the psychology of fear
Police culture and the psychology of fear CSSaunders
 
Cornerstone of police leadership
Cornerstone of police leadershipCornerstone of police leadership
Cornerstone of police leadershipCSSaunders
 
How the police can work with academics to improve policing
How the police can work with academics to improve policingHow the police can work with academics to improve policing
How the police can work with academics to improve policingCSSaunders
 
'Teal' policing - creating a more human centric and participative culture in ...
'Teal' policing - creating a more human centric and participative culture in ...'Teal' policing - creating a more human centric and participative culture in ...
'Teal' policing - creating a more human centric and participative culture in ...CSSaunders
 
Evaluation tales: practical to organisational insights
Evaluation tales: practical to organisational insights Evaluation tales: practical to organisational insights
Evaluation tales: practical to organisational insights CSSaunders
 
Lancashire Constabulary - Innovation: a practitioner's view
Lancashire Constabulary - Innovation: a practitioner's viewLancashire Constabulary - Innovation: a practitioner's view
Lancashire Constabulary - Innovation: a practitioner's viewCSSaunders
 
Designing collective intelligence for policing
Designing collective intelligence for policingDesigning collective intelligence for policing
Designing collective intelligence for policingCSSaunders
 
Overcoming risk aversion in policing
Overcoming risk aversion in policingOvercoming risk aversion in policing
Overcoming risk aversion in policingCSSaunders
 
How police and crime commissioners can unlock innovation
How police and crime commissioners can unlock innovationHow police and crime commissioners can unlock innovation
How police and crime commissioners can unlock innovationCSSaunders
 
Two cheers for evidence-based policing
Two cheers for evidence-based policing Two cheers for evidence-based policing
Two cheers for evidence-based policing CSSaunders
 
Future of neighbourhood_policing_presentation
Future of neighbourhood_policing_presentationFuture of neighbourhood_policing_presentation
Future of neighbourhood_policing_presentationCSSaunders
 
If not you who?
If not you who?If not you who?
If not you who?CSSaunders
 
Networked policing - the Greater Manchester Experience
Networked policing - the Greater Manchester Experience Networked policing - the Greater Manchester Experience
Networked policing - the Greater Manchester Experience CSSaunders
 
Joining up what we've got or designing for what is needed?
Joining up what we've got or designing for what is needed?Joining up what we've got or designing for what is needed?
Joining up what we've got or designing for what is needed?CSSaunders
 
Networked policing: learning and working across organisational boundaries to ...
Networked policing: learning and working across organisational boundaries to ...Networked policing: learning and working across organisational boundaries to ...
Networked policing: learning and working across organisational boundaries to ...CSSaunders
 
A whole family approach to tackling domestic abuse
A whole family approach to tackling domestic abuseA whole family approach to tackling domestic abuse
A whole family approach to tackling domestic abuseCSSaunders
 

Mais de CSSaunders (20)

Public Safety and Security in the 21st Century
Public Safety and Security in the 21st CenturyPublic Safety and Security in the 21st Century
Public Safety and Security in the 21st Century
 
Spreading innovation and learning: the role of the College of Policing
Spreading innovation and learning: the role of the College of PolicingSpreading innovation and learning: the role of the College of Policing
Spreading innovation and learning: the role of the College of Policing
 
Driving innovation with technology
Driving innovation with technologyDriving innovation with technology
Driving innovation with technology
 
How to think and act like a public entrepreneur
How to think and act like a public entrepreneurHow to think and act like a public entrepreneur
How to think and act like a public entrepreneur
 
Police culture and the psychology of fear
Police culture and the psychology of fear Police culture and the psychology of fear
Police culture and the psychology of fear
 
Cornerstone of police leadership
Cornerstone of police leadershipCornerstone of police leadership
Cornerstone of police leadership
 
How the police can work with academics to improve policing
How the police can work with academics to improve policingHow the police can work with academics to improve policing
How the police can work with academics to improve policing
 
'Teal' policing - creating a more human centric and participative culture in ...
'Teal' policing - creating a more human centric and participative culture in ...'Teal' policing - creating a more human centric and participative culture in ...
'Teal' policing - creating a more human centric and participative culture in ...
 
Evaluation tales: practical to organisational insights
Evaluation tales: practical to organisational insights Evaluation tales: practical to organisational insights
Evaluation tales: practical to organisational insights
 
Lancashire Constabulary - Innovation: a practitioner's view
Lancashire Constabulary - Innovation: a practitioner's viewLancashire Constabulary - Innovation: a practitioner's view
Lancashire Constabulary - Innovation: a practitioner's view
 
Designing collective intelligence for policing
Designing collective intelligence for policingDesigning collective intelligence for policing
Designing collective intelligence for policing
 
Overcoming risk aversion in policing
Overcoming risk aversion in policingOvercoming risk aversion in policing
Overcoming risk aversion in policing
 
How police and crime commissioners can unlock innovation
How police and crime commissioners can unlock innovationHow police and crime commissioners can unlock innovation
How police and crime commissioners can unlock innovation
 
Two cheers for evidence-based policing
Two cheers for evidence-based policing Two cheers for evidence-based policing
Two cheers for evidence-based policing
 
Future of neighbourhood_policing_presentation
Future of neighbourhood_policing_presentationFuture of neighbourhood_policing_presentation
Future of neighbourhood_policing_presentation
 
If not you who?
If not you who?If not you who?
If not you who?
 
Networked policing - the Greater Manchester Experience
Networked policing - the Greater Manchester Experience Networked policing - the Greater Manchester Experience
Networked policing - the Greater Manchester Experience
 
Joining up what we've got or designing for what is needed?
Joining up what we've got or designing for what is needed?Joining up what we've got or designing for what is needed?
Joining up what we've got or designing for what is needed?
 
Networked policing: learning and working across organisational boundaries to ...
Networked policing: learning and working across organisational boundaries to ...Networked policing: learning and working across organisational boundaries to ...
Networked policing: learning and working across organisational boundaries to ...
 
A whole family approach to tackling domestic abuse
A whole family approach to tackling domestic abuseA whole family approach to tackling domestic abuse
A whole family approach to tackling domestic abuse
 

Último

Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlEdouardHusson
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processNAP Global Network
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learningNAP Global Network
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...tanu pandey
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30JSchaus & Associates
 
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...SUHANI PANDEY
 
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourCall Girls in Nagpur High Profile
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...SUHANI PANDEY
 
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...Call Girls in Nagpur High Profile
 
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...MOHANI PANDEY
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourCall Girls in Nagpur High Profile
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'NAP Global Network
 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31JSchaus & Associates
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCNAP Global Network
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfSamirsinh Parmar
 
Call Girls In datia Escorts ☎️7427069034 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ☎️7427069034  🔝 💃 Enjoy 24/7 Escort Service Enjoy...Call Girls In datia Escorts ☎️7427069034  🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ☎️7427069034 🔝 💃 Enjoy 24/7 Escort Service Enjoy...nehasharma67844
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 

Último (20)

Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'IsraëlAntisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
Antisemitism Awareness Act: pénaliser la critique de l'Etat d'Israël
 
Scaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP processScaling up coastal adaptation in Maldives through the NAP process
Scaling up coastal adaptation in Maldives through the NAP process
 
The NAP process & South-South peer learning
The NAP process & South-South peer learningThe NAP process & South-South peer learning
The NAP process & South-South peer learning
 
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...Pimpri Chinchwad ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi R...
Pimpri Chinchwad ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi R...
 
2024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 302024: The FAR, Federal Acquisition Regulations, Part 30
2024: The FAR, Federal Acquisition Regulations, Part 30
 
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
Hinjewadi * VIP Call Girls Pune | Whatsapp No 8005736733 VIP Escorts Service ...
 
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Agra Escorts Just Dail 8250092165 service available anytime 24 hour
 
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition PlansSustainability by Design: Assessment Tool for Just Energy Transition Plans
Sustainability by Design: Assessment Tool for Just Energy Transition Plans
 
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
VIP Model Call Girls Lohegaon ( Pune ) Call ON 8005736733 Starting From 5K to...
 
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
celebrity 💋 Nagpur Escorts Just Dail 8250092165 service available anytime 24 ...
 
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
Get Premium Budhwar Peth Call Girls (8005736733) 24x7 Rate 15999 with A/c Roo...
 
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Chakan Call Me 7737669865 Budget Friendly No Advance Booking
 
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hourcelebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
celebrity 💋 Patna Escorts Just Dail 8250092165 service available anytime 24 hour
 
Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'Coastal Protection Measures in Hulhumale'
Coastal Protection Measures in Hulhumale'
 
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Shikrapur ( Pune ) Call ON 8005736733 Starting From 5K t...
 
2024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 312024: The FAR, Federal Acquisition Regulations, Part 31
2024: The FAR, Federal Acquisition Regulations, Part 31
 
Financing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCCFinancing strategies for adaptation. Presentation for CANCC
Financing strategies for adaptation. Presentation for CANCC
 
Election 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdfElection 2024 Presiding Duty Keypoints_01.pdf
Election 2024 Presiding Duty Keypoints_01.pdf
 
Call Girls In datia Escorts ☎️7427069034 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ☎️7427069034  🔝 💃 Enjoy 24/7 Escort Service Enjoy...Call Girls In datia Escorts ☎️7427069034  🔝 💃 Enjoy 24/7 Escort Service Enjoy...
Call Girls In datia Escorts ☎️7427069034 🔝 💃 Enjoy 24/7 Escort Service Enjoy...
 
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Chakan ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Chakan ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 

Professor Martin Gill, Director, Perpetuity Research

  • 1. Perpetuity Research & Consultancy International (PRCI) Ltd www.perpetuityresearch.com Tackling Cyber Crime: TheTackling Cyber Crime: The Role of Private SecurityRole of Private Security Professor Martin GillProfessor Martin Gill m.gill@perpetuityresearch.comm.gill@perpetuityresearch.com
  • 3. The focusThe focus  Understanding the role of privateUnderstanding the role of private security in tackling cyber crimesecurity in tackling cyber crime  A lot of cyber-security expertise is inA lot of cyber-security expertise is in the private sector – how do responsesthe private sector – how do responses to cyber crime reflect this?to cyber crime reflect this?  What constitutes cyber crime?What constitutes cyber crime?
  • 4. DefinitionDefinition  Definitions typically focus, to a lesser or greater extent, on whether offences are cyber dependent, cyber enabled, or cyber assisted  In practice, cyber crime involves a wide variety of offences, some are routine and a nuisance and some are serious and can require a wide variety of skill sets to manage
  • 5. DefinitionDefinition  UK GovernmentUK Government ‘illegal activities undertaken by criminals for financial gain which exploit vulnerabilities in the use of the internet and other electronic systems to illicitly access or attack information and services used by citizens, business and the Government’
  • 6. Cyber security in perspectiveCyber security in perspective  People, not least security staff, arePeople, not least security staff, are crucial to protecting against cyber losscrucial to protecting against cyber loss although this is often undervalued andalthough this is often undervalued and under-statedunder-stated  Considerable overlap between goodConsiderable overlap between good cyber security and good overall securitycyber security and good overall security  Adequate cyber response requiresAdequate cyber response requires agencies to work togetheragencies to work together
  • 7. ImportanceImportance  Much of the infrastructure that underpins cyberspace is owned and maintained by different elements of the private sector; inevitably it is business that will need to take a leading role in offering protection
  • 8. ConsequencesConsequences  Loss of sales  Fall in stocks and share prices  Loss of profit  Adverse media coverage  Higher employee turnover  Key staff/talent retention issues  Employee disengagement and dissatisfaction
  • 9. ConsequencesConsequences  A drop in consumer confidence  The loss of suppliers or sales  Reduction in influence of the organisation on policy-makers in their sector/industry  The costs and complications of managing recovery and improving resilience after a cyber attack
  • 10. Clash of culturesClash of cultures  ‘IT security requires technical expertise but not large numbers of staff, whereas physical security generally has the opposite’ (Tyson)
  • 11. ContextContext  Police are often relatively minorPolice are often relatively minor playersplayers  Police sometimes lack trust in otherPolice sometimes lack trust in other partners (including members of publicpartners (including members of public and online community)and online community)  Police face problems – lack ofPolice face problems – lack of technical skill, disjointed approach,technical skill, disjointed approach, insufficient resources, poorinsufficient resources, poor understanding of cyber spaceunderstanding of cyber space
  • 12. ResearchingResearching  A survey was conducted of securityA survey was conducted of security professionals from around the worldprofessionals from around the world  Follow-up one-to-one interviews withFollow-up one-to-one interviews with physical and cyber security specialistsphysical and cyber security specialists
  • 13. ResearchResearch  Research addressed 4 key areas:Research addressed 4 key areas: – The current approach to managingThe current approach to managing cyber securitycyber security – The relevance of convergenceThe relevance of convergence between physical and cyber securitybetween physical and cyber security – Perspectives on law enforcementPerspectives on law enforcement – The potential role of private securityThe potential role of private security in responding to cyber crimein responding to cyber crime
  • 14. The current approach to managingThe current approach to managing cyber securitycyber security  88% of respondents agreed that88% of respondents agreed that organisations were poor at preventingorganisations were poor at preventing cyber crimecyber crime  63% of respondents agreed that63% of respondents agreed that organisations were poor in knowingorganisations were poor in knowing when there had been a breach ofwhen there had been a breach of securitysecurity
  • 15. QuotesQuotes  ‘Our clients, in most cases at least, don’t see the threat of cyber, it is not visible, they would have to be shown something to notice’. Head of Security, Construction   ‘It is not well understood, I work with start ups as well as multi-national companies, and on the whole, they think it will not happen to them. There is a lack lustre attitude, it baffles me…Security is not an easy sell.’ Consultant, Website Development
  • 16. People matterPeople matter  45% believed that cyber and physical45% believed that cyber and physical security were equally important in thesecurity were equally important in the companies they were linked tocompanies they were linked to  55% agreed that people issues were55% agreed that people issues were more important than technology inmore important than technology in tackling cyber crimetackling cyber crime  81% agreed that an alert workforce81% agreed that an alert workforce was the best defence against cyberwas the best defence against cyber crimecrime
  • 17. QuoteQuote  ‘The humans, all of your staff are your most effective line of defence. Technology is a critical part’. Head of Cyber Resilience, Security Supplier  You could have all the technical security solutions in the world and all it takes is the human factor to create risk and introduce a threat’. On-line surveyOn-line survey
  • 18. ConvergenceConvergence ‘Security convergence is the integration, in a formal, collaborative, and strategic manner, of the cumulative security resources of an organisation in order to deliver enterprise-wide benefits through enhanced risk mitigation, increased operational effectiveness and efficiency, and cost savings’ (Tyson)
  • 19. The relevance of convergenceThe relevance of convergence between physical and cyber securitybetween physical and cyber security  Considerable support for the idea ofConsiderable support for the idea of convergenceconvergence – 56% argued for some type of56% argued for some type of converged working, 38% for separateconverged working, 38% for separate teams, 6% not sureteams, 6% not sure  More research needed to translate theoryMore research needed to translate theory into practice and understand differentinto practice and understand different models/approaches of convergencemodels/approaches of convergence
  • 20. The relevance of convergenceThe relevance of convergence between physical and cyber securitybetween physical and cyber security  29% of respondents agreed that bringing29% of respondents agreed that bringing together physical and cyber securitytogether physical and cyber security specialists was widely understood inspecialists was widely understood in relation to securityrelation to security  35% felt that physical security experts did35% felt that physical security experts did not want to get involved in cyber securitynot want to get involved in cyber security  56% felt that cyber security personnel did56% felt that cyber security personnel did not want physical security experts involvednot want physical security experts involved in ’their’ areain ’their’ area
  • 21. QuoteQuote  ‘In fact, more and more they are the same place, as in physical security we are moving towards the same assessments and policies and we are working in the same direction, in a couple of years we will merge’. Security Manager (Physical), Bank
  • 22. QuoteQuote  ‘I follow the same risk assessment and risk evaluation process. They may require different skill sets to get under the skin of threats and the availability and effectiveness of controls, but broad resilience risk management should follow the same thought process’. Head of Resilience, Utilities
  • 23. QuoteQuote  ‘If you have a cyber attack there is often a physical element to it, a demand or a ransom for example, so it will soon become a ransom management project; information is a valuable asset after all, and these offenders know that’. Security Manager, Service Provider
  • 24. BarriersBarriers  Barriers commonly thought of asBarriers commonly thought of as coming between physical security andcoming between physical security and cyber threats were:cyber threats were: – The belief that cyber is outside theThe belief that cyber is outside the remit of physical securityremit of physical security – The lack of cyber expertise amongstThe lack of cyber expertise amongst physical security expertsphysical security experts – Belief that cyber specialistsBelief that cyber specialists generally operate in isolationgenerally operate in isolation
  • 25. QuoteQuote  The advantage of being separate is about skills sets, about being able to dedicate a focus to professionals in their dedicated sphere rather than being seen as a one-stop-shop’. Security Manager, Energy provider
  • 26. QuoteQuote  ‘The biggest difference that I experience – we have about 150 offices and they all look different – different types of buildings, different security – I have to achieve security in all those places. The cyber folks – when they go to address something on a network, they are doing the same thing everywhere – the network looks the same everywhere, the computers look the same’. Director of Physical Security, risk management company
  • 27. QuoteQuote  ‘When looking at physical and cyber there is a difference. When something goes wrong what is harmful? In the case of physical security human beings can get hurt, if cyber goes wrong no one will get physically hurt, no one will die unless a cyber attacker hacks hospitals, so outcomes of risks are different, with physical you can die with cyber the harm is more financially’. Global Security Director, Security Supplier.
  • 28. ConvergenceConvergence  Although then a lot of support thereAlthough then a lot of support there are concerns and the clash of culturesare concerns and the clash of cultures is worthy of special commentis worthy of special comment
  • 29. QuoteQuote  In physical they are pretty much driven to be physically dominant, alpha personalities, physical control over physical space and by and large info security services people don’t have that cultural approach, they are geeky, introverted focused on their technologies and how they can be used, and they tend not to be very physical people’. Cyber Security Partnership Manager
  • 30. Perspectives on lawPerspectives on law enforcementenforcement  3% respondents strongly agreed that3% respondents strongly agreed that the police are effective at tacklingthe police are effective at tackling cyber crimecyber crime  4% thought they were experts in this4% thought they were experts in this areaarea  18% agreed that police are effective at18% agreed that police are effective at tackling cyber crimetackling cyber crime
  • 31. QuoteQuote  ‘They don’t understand it. They don’t have the resources. They see it as a business issue. Stealing data from a business is not seen as a crime, it’s seen…as a crime against business, not society’. Director of Physical Security, Risk Management Company
  • 32. QuoteQuote  ‘Companies report incidents but never get feedback and it is the same for the intelligence services; when we report intelligence, say about spamming, we send reports and call friends and contacts but we get no feedback. Only one side communication; we give but we don’t receive. Everyone speaks about public and private partnership and it is only one way’. Security Manager (Physical), Bank
  • 33. Law enforcementLaw enforcement  69% of those who expressed an69% of those who expressed an opinion either way agreed that it isopinion either way agreed that it is impractical to report all cyber crimeimpractical to report all cyber crime  General view that the scale of cyberGeneral view that the scale of cyber offending and depletion of resourcesoffending and depletion of resources available to police meantavailable to police meant organisations will have to takeorganisations will have to take responsibility for protectingresponsibility for protecting themselvesthemselves
  • 34. QuoteQuote  ‘The police need to set up an effective response to cyber crime, this means being agile and flexible; they need to be able to move quickly. They need to think in a different paradigm’. Corporate Head of Security, Retail
  • 35. The potential role of private securityThe potential role of private security in responding to cyber crimein responding to cyber crime  52% respondents agreed that any52% respondents agreed that any approach to cyber that didn’t include aapproach to cyber that didn’t include a physical response was therefore weakphysical response was therefore weak  79% thought that physical security79% thought that physical security was crucial to tackling cyberwas crucial to tackling cyber
  • 36. Thinking about the physicalThinking about the physical  38% agreed physical security38% agreed physical security suppliers often don’t see opportunitiessuppliers often don’t see opportunities for contributing to cyber securityfor contributing to cyber security  52% felt that manned guarding52% felt that manned guarding companies could make a contribution,companies could make a contribution, 38% thought facilities management38% thought facilities management companies could, 91% thoughtcompanies could, 91% thought security consultants couldsecurity consultants could
  • 37. QuoteQuote  ‘[there are] lots of opportunities for a bold security company [to] be a bit of a disrupter, and maybe they have to employ different people, and pay more, the size of the prize is high: any dinosaur that isn’t adapting might struggle justifying what they do with the current group of people’. Head of Resilience, Utilities
  • 38. Overall commentsOverall comments  Physical security has generally underplayedPhysical security has generally underplayed the contribution it can make to tackling cyberthe contribution it can make to tackling cyber crimecrime  Some felt that by not engaging in this area, itSome felt that by not engaging in this area, it was missing an opportunity to influence andwas missing an opportunity to influence and profit from this workprofit from this work  There is a mistaken tendency to see theThere is a mistaken tendency to see the response to cyber crime in terms ofresponse to cyber crime in terms of technologytechnology  Convergence is widely discussed but there’sConvergence is widely discussed but there’s a lack of clarity as to what this meansa lack of clarity as to what this means
  • 39. CommentsComments  Police have an important role to play, butPolice have an important role to play, but there needs to be more awareness aboutthere needs to be more awareness about what can be realistically expectedwhat can be realistically expected  Cost of technical cyber response can beCost of technical cyber response can be high and this excludes many companieshigh and this excludes many companies from being able to afford what they need.from being able to afford what they need.  Cyber threats are relatively new andCyber threats are relatively new and security and policing worlds are only nowsecurity and policing worlds are only now beginning to determine the merits ofbeginning to determine the merits of different approachesdifferent approaches
  • 40. More informationMore information  To obtain a copy of the reportTo obtain a copy of the report ((Tackling Cyber Crime: The Role of Private Security) and other reports goand other reports go to:to:  www.perpetuityresearch.comwww.perpetuityresearch.com
  • 41. Recognising OutstandingRecognising Outstanding PerformersPerformers  For information on a new worldwideFor information on a new worldwide scheme recognising those who arescheme recognising those who are excellent at what they do, go to:excellent at what they do, go to:  www.theospas.comwww.theospas.com
  • 42. Perpetuity Research & Consultancy International (PRCI) Ltd www.perpetuityresearch.com Tackling Cyber Crime: TheTackling Cyber Crime: The Role of Private SecurityRole of Private Security Professor Martin GillProfessor Martin Gill m.gill@perpetuityresearch.comm.gill@perpetuityresearch.com