Security in a Mobile World

13
SUMMARY REPORT 13 March 2014 Hotel Amigo Brussels SECURITY IN A MOBILE WORLD Challenges Facing the Public Sector

description

The Financial Times, in association with HP, recently hosted a forum to discuss the latest security threats being faced by public sector institutions in Brussels and the steps which are being taken to address them. Read this report to see the key insights gathered from the event.

Transcript of Security in a Mobile World

Page 1: Security in a Mobile World

SUMMARY REPORT

13 March 2014 Hotel AmigoBrussels

Security in a Mobile WorldChallenges Facing the Public Sector

Page 2: Security in a Mobile World

AgendA

18:00 RegistrationandDrinksReception

18:30 WelcomeRemarksfromFTChair

ChristianOliver, EU Correspondent, Financial Times

18:40 KeynoteAddress

ReinhardPriebe, Director, ‘Internal Security’, European Commission, DG Home Affairs

• The cybersecurity challenge: how the EU is fighting cybercrime• The potential value of public-private cooperation• Data protection and privacy• Tackling the issue of post-Snowden surveillance

19:00 Dinner

20:00 PanelDiscussion:TheSecurityChallenge

• How do you believe cyber crime has evolved over the past few years and what impact has this had on the public sector? Is there the right focus on security?• As security threats continue to grow, how can all parties work together to fight the criminals? Can we ever hope to get policy agreed internationally, and will it ever be able to keep up with technology?• What impact have the latest technology trends had on mobile computing (cloud, BYOD)? As we become increasingly connected, what risks are we exposed to? Which kind of mobile devices do people buy, and to what extent might consumers act in a more protectionist way e.g avoiding foreign products?• What is your perspective on the planned EU data protection reforms? Is there a risk of having too many restraints on the way security operations are run? At what point should a company report a breach?• In a post Snowden world how can we strike a balance between security, ethics and privacy; the need to be overt vs covert? PANELLISTSMikeLoginov, Chief Strategist, EMEA Cyber Security – Public Sector, HP JamieShea, Deputy Assistant Secretary General, Emerging Security Challenges Division, NATOMarcVael, International Vice-President, ISACA

MODErATOrChristianOliver, EU Correspondent, Financial Times

21:00 ConcludingRemarksfromFTChair

ChristianOliver, EU Correspondent, Financial Times

21:05 NetworkingDrinks

Security in a Mobile World

Page 3: Security in a Mobile World

Summary report

The Financial Times, in association with HP, hosted a private dinner forum on Thursday 13th March to discuss the latest security threats being faced by public sector institutions in Brussels and the steps which are being taken to address them. Here are the key insights gathered from the event.

Keynote address: Fighting Cyber Crime together

The keynote speaker began with an update on the latest progress with the European Union’s cyber security strategy. This document from the European Commission proposes to show how involving all relevant parties is the most effective way of addressing the cyber security challenge. It outlines the top priorities for achieving cyber resilience and reducing cybercrime, whilst also reflecting the core values of the EU.

The extent to which the public and private sectors can work together to combat cyber crime was discussed. Public authorities increasingly rely on private companies to

carry out their security tasks, as this is where data is mostly stored, but is it fair for private companies to be asked to provide their data for public needs, in the majority of cases without compensation? Despite any conflicting interests, it is critical to establish a balance between public and private concerns in order to progress with cyber security policies.

In today’s digital world, data protection is still crucial but existing principles must also adapt to new innovations. It was recognised that, as with all new developments in our society, first comes the excitement and then the awareness of the need for rules; the internet offers a new dimension of freedom of expression and freedom of business, which have to be understood before problems can be addressed. Additionally, different countries have varying perspectives on the concept of internet freedom so cyber diplomacy is important in order to achieve a balance through dialogue and negotiation.

Page 4: Security in a Mobile World

Security in a Mobile World

panel Discussion: the Security Challenge

Facing the growing cyber security threat

The panel opened with the question of whether or not the challenge of the cyber threat has been over-estimated. It was argued that we need to look at the facts, as evidence suggests that adversaries are remaining undetected in IT systems for longer than ever before, and that once identified it takes even longer to fight and remove them. Building on this, one panellist stated that the cyber threat will be with us for a long time before a solution can be found, in contrast to other instances in history where responses to attacks were rapid. As data quantities continue to grow, the threat of attacks will also increase. Despite this, it was recognised that 90% of current attacks are relatively simple and could be avoided with the right security culture in place.

Protecting data – whose responsibility is it?

The issue of where responsibility lies for security was a major topic of discussion. In order to make our increasingly mobile and digital world safer it is clear that greater collaboration is necessary. One panellist made the point that the Internet is the one area of security that preoccupies governments because most of the networks are in the hands of the private sector. The conclusion was that it is a vast problem which will require greater interaction of various levels of society in order to find a solution, but with clearly defined responsibilities.

Following this, the importance of individual awareness was emphasised, with one panellist suggesting that while we should all be aware that our data is being stored somewhere, the question we should be asking is, what is it being used for and what controls are in place to protect it?

The ‘Bring Your Own Device’ trend was a shared concern, along with the question of how much data can be collectively contained.

Page 5: Security in a Mobile World

Summary report

There is a danger of over-classification of data, which has the potential to slow everything down. With this in mind, organisations should start looking at “what it is I am trying to protect and what it is I am willing to give up”.

On the subject of privacy one panellist observed that “people accept risk if they feel it brings them value”. Companies should embrace technology but in an intelligent way, encouraging a culture in which people are aware of security. The panel was in agreement that greater board level recognition of security issues is needed. Aside from this, it was felt that the challenge lies in allowing people the freedom to use the devices they want while also ensuring that the necessary controls are in place to protect data.

The move towards transparency

As a final point, it was suggested that following the Snowden revelations intelligence agencies will be more central to security in future, as nations focus on trying to anticipate and prevent threats in advance rather than

reacting to them. The problem lies in the sheer quantity of data that is being generated, which makes it very difficult to accurately identify security threats.

One panellist concluded that the key word moving into the next few years is trust: both in the Internet and of citizens in their governments. Greater transparency is required in order to establish a culture of trust.

Page 6: Security in a Mobile World

BIoGrapHIeS

CHAIR

christian oliverEU CorrespondentFinancial Times

Christian Oliver has been the Financial Times’ EU Correspondent since January 2014 and is based in Brussels. He started out as a journalist with Reuters in 2002, covering the UK. He was then posted to Iran from 2003 to 2006 and Venezuela from 2006 to 2007. Mr Oliver joined the FT in 2008 as Korea Correspondent and became Deputy Analysis Editor in London in 2012.

Page 7: Security in a Mobile World

Security in a Mobile World

reinhard PriebeDirector, ‘Internal Security’European Commission, DG Home Affairs

Reinhard Priebe has been the Director of ‘Internal Security’ in the Directorate General Home Affairs since 2010. He joined the European Commission in 1984 as Directorate General for Agriculture, where he served in the ‘Agricultural Law’ unit until 1991; Assistant to the Deputy Director General (1991-1993); Head of the unit for ‘Measures of Objective 5a of Structural Funds,

Agro-environmental and Early Retirement Schemes (1993-1997); and Head of the unit for ‘Agricultural Law’ (1997-2001). From 2001 to 2006 Mr Priebe was the Director for the ‘Western Balkans’ in the Directorate General for External Relations and Enlargement. From 2006 to 2008 he served as Director for ‘Conservation Policy’ in the Directorate General for Fisheries and Maritime Affairs. From 2008 to 2009 he was the Director of ‘Atlantic, Outermost Regions and Arctic’ in the Directorate General of Maritime Affairs and Fisheries.

Before joining the European Commission, Mr Priebe was the Assistant at the Federal Constitutional Court from 1979 to 1983. Prior to this he served as a judge at the Administrative Court in Stuttgart (1977 to 1979). He completed his law degree in 1972.

KEYnOTE

Page 8: Security in a Mobile World

Mike loginovChief Strategist, EMEA Cyber Security – Public SectorHP

Mike Loginov is the Chief Strategist for Enterprise Security Services and has responsibility for the EMEA cyber security strategy for the public sector.

Prior to this role Mr Loginov was the Chief Executive Officer of a cyber security group and co-founder of Executive Risk Magazine, a

cyber security and risk publication for executives. He also served as UK Managing Director for an IT global services organisation where he ran teams of ethical hackers, CLAS, CHECK, risk management and ISO27001 Consultants prior to this being aquired by KPMG.

Mr Loginov is a Certified Chief Information Security Officer (C|CISO) and security practice leader with over 30 years’ experience as a retained adviser and consultant to a number of corporates and organisations. He is also an Executive Director for the ISSA (UK) and is an executive member on pan government advisory boards and technology forums on digital security-related matters. He is Chairman of the Cyber Strategist Forum, a group of industry professionals that provides a thought leadership perspective on the bigger issues that affect government, business and society. He also serves as an advisor to industry and government on cyber security next generation design.

Mr Loginov was educated in the British military and has worked with a range of government agencies and teams including CEOP/SOCA, nPIA, MoD, MoJ, special forces, police, Big Four consultancies and as Managing Director for a List X GCHQ accredited CLAS and CHECK facility. His interests include EU governmental relations and the Cyber Security Digital Agenda.

PAnELLISTS

BIoGrapHIeS

Page 9: Security in a Mobile World

Security in a Mobile World

Jamie SheaDeputy Assistant Secretary General, Emerging Security Challenges DivisionNATO

Jamie Shea is Deputy Assistant Secretary General for Emerging Security Challenges at nATO. He has been working with nATO since 1980 in various roles: he was Director of Policy Planning in the Private Office of the Secretary General; and Deputy Assistant Secretary General for External Relations in the Public Diplomacy Division. He has also served as Director of Information and Press;

Spokesman of nATO; Deputy Director of Information and Press; Deputy Head and Senior Planning Officer at the Policy Planning and Multilateral Affairs Section of the Political Directorate; as well as Assistant to the Secretary General of nATO for Special Projects.

Dr Shea is involved with several prominent academic institutions. He is a professor at the Collège d’Europe, Bruges; Visiting Lecturer in the Practice of Diplomacy at the University of Sussex; and Associate Professor of International Relations at the American University, Washington DC, where he also holds the position of Director of the Brussels Overseas Study Programme. In addition to this he lectures at the Brussels School of International Studies at the University of Kent.

Dr Shea holds a D.Phil. in Modern History from Oxford University (Lincoln College), awarded in 1981. He is a regular lecturer and conference speaker on nATO and European security affairs and on public diplomacy, political communication and lobbying. Among his many associations and memberships, Dr Shea is Member of the Advisory Board of the Security and Defence Programmes at Chatham House; Member of the Policy Council at the World Economic Forum in Geneva; and Founder and Member of the Board for the Security and Defence Agenda in Brussels.

PAnELLISTS

Page 10: Security in a Mobile World

BIoGrapHIeS

Marc VaelInternational Vice-PresidentISACA

Marc Vael is International Vice-President of ISACA and President of the ISACA Belgium Chapter. He is also Chief Audit Executive at Smals, a Belgian IT company which works for Belgian Federal Social Security Institutions, where he is responsible for all internal auditing activities reporting to the Audit committee.

Mr Vael has 20 years of active experience in risk and information security management, BCM/DRP, data protection/privacy and IT Audit. Previously, he was national Information Security Officer for a large consulting company for more than five years. He is a guest professor at Antwerp Management School and Solvay Brussels School, Deputy Member of the Flemish Privacy Commission, Board Member of SAI and member of the Permanent Stakeholder Group of EnISA. Mr Vael has three Master degrees and several other certifications including CISSP and CISM.

PAnELLISTS

Page 11: Security in a Mobile World

For more updates, please see our Facebook page: www.facebook.com/Financialtimeslive

Financial Times Live group:http://on.ft.com/linkedin

FolloW Ft liVe

For live updates from events and to participate on Twitter:www.twitter.com/ftlive

t

v

ą

Financial times live, the global conferences and events arm of the Financial Times, gathers pre-eminent public and private sector decision-makers, visionaries and strategists from the world’s most important economies and industries for a wide range of interactive, agenda-setting programmes that combine the power of on-site discussion and networking with the flexibility of live-streamed and on-demand broadcasting.

Chaired by senior journalists from the Financial Times and its group publications, the summits, conferences, awards and strategic forums organised by FT Live provide audiences with the opportunity to listen to and interact with speakers of the highest calibre in lively and stimulating debates that cover the key issues of our time.

The Financial Times provides essential news, comment, data and analysis for the global business community. It has a combined print and online average daily readership of 2.1 million people worldwide and a combined paid print and digital circulation of almost 629,000 (Deloitte assured, Q3 2013). FT education products now serve 34 of the world’s top 50 business schools.

www.ft-live.comwww.ft.com

orGaNISerS

Page 12: Security in a Mobile World

Security in a Mobile World

HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. The world’s largest technology company, HP brings together a portfolio that spans printing, personal computing, software, services and IT infrastructure to solve customer problems.

www.hp.com

Page 13: Security in a Mobile World

Financial times liveOne Southwark BridgeLondon SE1 9HLUK

T: +44 (0) 20 7775 6653E: [email protected]

www.ft-live.com/hpciowww.ft-live.com