After The Interview, Sony’s Rebuilding at Golden Networking’s Cyber Security World Conference 2015 New York City

Golden Networking

Building off of the momentum of past successful conferences, Golden Networking brings Cyber Security World Conference 2015 New York City (www.CyberSecurityWorldConference.com), summit that will bring the latest thinking from security experts to hundreds of senior executives focused on protecting enterprises’ information assets.

File photo of a security guard standing at the entrance of United Artists theater during the premiere of the film "The Interview" in Los Angeles

New York, NY, USA (January 1, 2015) — Headlines in recent weeks have been consumed with the news of a cyberattack that targeted Sony’s movie studio as it geared to release The Interview, film that describes a CIA attempt to assassinate North Korean leader Kim Jong- un.

The company now could face tens of millions of dollars in costs from the massive computer hack that hobbled its operations for days. Major costs include investigations into what happened, computer repairs or replacements, and steps to prevent a future attack. Lost productivity while operations were disrupted will add to the price tag.

The attack, believed to be the worst of its type on a company on U.S. soil, also hits Sony’s reputation for a perceived failure to safeguard information. Recently on October that U.S. President Barack Obama signed an executive order to strengthen security measures for federal credit cards, and urged banks and retailers to follow suit in an effort to combat cyber theft and identity fraud. Several major corporations would take steps to make their own systems more secure and offer more customer protections as well.

These recommendations came after many other large companies including Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, JPMorgan Chase, Nasdaq OMX, Neiman Marcus, Target and Wal-mart had suffered high-profile cyber security breaches. It is not beyond the realm of possibilities to think that today the information of every American has already been compromised in any of these publicly disclosed attacks.

For instance, JPMorgan Chase, America’s largest bank with $2.39 trillion in assets, has revealed that about 76 million households and 7 million of small-business customers have been impacted by a cybersecurity attack in one of the most sweeping disclosed global breaches. Unknown attackers stole customers’ contact information, which included names, email addresses, phone numbers and addresses, affecting an amount equivalent to two-thirds of American households.

Cyber Security World Conference 2015 New York City (http://www.CyberSecurityWorldConference.com) will provide a platform for information security authorities and innovative service providers to distil their latest research for hundreds of senior executives focused on protecting enterprise and government valuable assets. Cyber security experts will discuss subjects such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Top-of-mind topics that Cyber Security World Conference 2015 will discuss include:

• Cyber Security Megatrends Security Professionals can’t Ignore Today
• Strengthening the Security of Industry-wide Technology Infrastructure
• How Hackers Really Operate to Obtain Financial Data
• Cyber Security and its Role in the Overall Security of the United States
• Key Considerations about Security in the Internet of Things Age
• Designing and Managing Effective Information Security Programs

Cyber Security World Conference 2015 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
jpetrova@goldennetworking.com
http://www.goldennetworking.com

How the Cybersecurity Framework Helps your Company at Cyber Security World Conference 2014 New York

Golden Networking

Building off of the momentum of past successful conferences, Golden Networking brings Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), forum that will bring the latest thinking from security experts to hundreds of senior executives focused on protecting enterprises’ information assets.

Cyber Security World Conference 2014

New York City, NY, USA (November 4, 2014) — A chain is only as strong as its weakest link, says Bill Buchanan, The Conversation. Computer security relies on a great number of links, hardware, software and something else altogether: you. The greatest threat to information security is actually people. Why strive to defeat encrypted passwords stored in computers, when those computers’ human users will turn them over willingly?

A huge problem with most types of digital communications, processing and storage is that it’s often very difficult to differentiate between a true communication and one which has been falsified. This stems largely from the internet’s background as an open, insecure system. In emails apparently from legitimate websites, the email address of the sender can be spoofed, that is, replaced with another that is not the sender’s actual address, as some email relay systems allow this.

Corporations are today targeted as never before, with growth in hacking attacks linked to nation states and overseas governments; in fact, sophisticated and sustained campaigns of phishing have succeeded in stealing information from firms and organizations all over the world. Symantec recorded a 62% rise in data breaches from spear phishing in 2013.

In response to the growing cyber threat, the Cybersecurity Framework, which was drafted by the Commerce Department’s National Institute of Standards and Technology (NIST), represents a tipping point in the evolution of cybersecurity, one in which the balance is shifting to proactive risk-management standards. While its application is voluntary, organizations across industries may gain significant benefits by adopting the guidelines.

Golden Networking’s Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com) will provide a platform for hundreds of senior executives focused on protecting today’s enterprises to learn more about the Cybersecurity Framework and how to apply it to their organization. Topics that Cyber Security World Conference 2014 will discuss include:

• Cyber Security Megatrends Security Professionals can’t Ignore Today
• Designing and Managing Effective Information Security Programs
• Is Biometrics the Key to Personal and Corporate Security?
• How Hackers Really Operate to Obtain Financial Data
• Key Considerations about Security in the Internet of Things Age
• Strengthening the Security of Industry-wide Technology Infrastructure
• Cyber Security and its Role in the Overall Security of the United States

About Cyber Security World Conference 2014
Cyber security is never again a term to ignore for individuals or corporations. The daily activities of all Americans, the country’s global economic prominence and worldwide security rely on a safe and resilient cyberspace. Unfortunately, the number of cyber-attacks has increased dramatically over the last years, exposing confidential personal and business data, disrupting critical operations, and imposing exorbitantly high costs on the economy overall.

Just recently, J.P. Morgan Chase, America’s largest commercial bank with $2.39 trillion in assets, announced that about 76 million households and 7 million of small-business customers had been affected by a cyber attack in one of the most sweeping known global breaches. The company said the unknown attackers stole customers’ contact information, which included names, email addresses, numbers and addresses, affected an amount equivalent to almost two-thirds of American households.

A brief walk down memory lane of some the biggest recent cyber-attacks now include Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, Nasdaq OMX, Neiman Marcus, Target and Wal-mart. It is not unlikely to consider that the information of every American has already been compromised in any of these publicly disclosed attacks.

Renowned information security experts and innovative service providers will present at Cyber Security World Conference 2014 their latest thinking to hundreds of senior executives focused on protecting enterprises and governmental agencies.

Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
jpetrova@goldennetworking.com
http://www.goldennetworking.com

Cyber Security World Conference 2014 to Build on Obama’s Cyber Threat Information Sharing Framework Against Global Hacker Attacks

Golden Networking

Building off of the momentum of past successful conferences, Golden Networking presents Cyber Security World Conference 2014 New York City (www.CyberSecurityWorldConference.com), forum that will bring the latest thinking from security experts to hundreds of senior executives focused on protecting enterprises and government’s information assets.

Cyber Security World Conference 2014

New York City, NY, USA (November 1, 2014) — According to The Hill, the Obama administration’s recently issued cyber threat information sharing framework comes at a time when discussions are heating up in Congress on stalled legislation dealing with cyber security. Why lawmakers and law enforcement officials have been pounding the pavement in recent weeks, declaring that steps to ease the sharing of information about cyber threats are critical for the country’s defenses, will be discussed at Golden Networking’s Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), unique professional gathering where cybersecurity experts are set to illustrate business on protecting their information from cyber-attacks.

The document fills a gap in the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST)’s more general cybersecurity framework, released on February 12, 2014. The framework, created through collaboration between industry and government, consists of standards, guidelines, and practices to promote the protection of critical infrastructure. The prioritized, flexible, repeatable, and cost-effective approach of the framework helps owners and operators of critical infrastructure to manage cybersecurity-related risk.

The Department of Homeland Security’s Critical Infrastructure Cyber Community C³ Voluntary Program helps align critical infrastructure owners and operators with existing resources that will assist their efforts to adopt the Cybersecurity Framework and manage their cyber risks. NIST also issued a companion roadmap that discusses NIST’s next steps with the Framework and identifies key areas of cybersecurity development, alignment, and collaboration.

Roadblocks to total implementation still remain though, as both industry and privacy groups have been hesitant to freely share information in the current legal landscape. One bill that would address the legal issues is the Cybersecurity Information Sharing Act (CISA), but it remains unclear whether the bill could see action in the lame-duck session after the elections, according to The Hill. Absent congressional action, businesses are concerned about whether they will be protected from liability when sharing information with the government. Conversely, privacy advocates are wary of what personal data industries might share with the government, given the surveillance activities that have been revealed at the National Security Agency (NSA).

About Cyber Security World Conference 2014

Cybersecurity is never again a term to ignore for individuals or corporations. The daily activities of all Americans, the country’s global economic prominence and worldwide security rely on a safe and resilient cyberspace. Unfortunately, the number of cyber-attacks has increased dramatically over the last years, exposing confidential personal and business data, disrupting critical operations, and imposing exorbitantly high costs on the economy overall.

Just recently, J.P. Morgan Chase, America’s largest commercial bank with $2.39 trillion in assets, announced that about 76 million households and 7 million of small-business customers had been affected by a cyberattack in one of the most sweeping known global breaches. The company said the unknown attackers stole customers’ contact information, which included names, email addresses, numbers and addresses, affected an amount equivalent to almost two-thirds of American households.

A brief walk down memory lane of some the biggest recent cyber-attacks now include Adobe Systems, Automated Data Processing, Citigroup, E*Trade Financial, Fidelity Investments, Home Depot, HSBC, Nasdaq OMX, Neiman Marcus, Target and Wal-mart. It is not unlikely to consider that the information of every American has already been compromised in any of these publicly disclosed attacks.

Renowned information security experts and innovative service providers will present at Cyber Security World Conference 2014 their latest thinking to hundreds of senior executives focused on protecting enterprises and governmental agencies. Topics that will be discussed include:

• Is Biometrics the Key to Personal and Corporate Security?
• Strengthening the Security of Industry-wide Technology Infrastructure
• Cyber Security Megatrends Security Professionals can’t Ignore Today
• Key Considerations about Security in the Internet of Things Age
• Cyber Security and its Role in the Overall Security of the United States
• How Hackers Really Operate to Obtain Financial Data
• Designing and Managing Effective Information Security Programs

Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
jpetrova@goldennetworking.com
http://www.goldennetworking.com

Center for Technology & National Security Policy Guru James Kadtke, at Top Cyber Security Conference

Golden Networking

Golden Networking brings Cyber Security World Conference 2014 New York City (www.CyberSecurityWorldConference.com), an extraordinaire gathering of dozens of security experts speaking with hundreds of senior executives focused on protecting today enterprise and government’s information assets.

Dr. James Kadtke

New York City, NY, USA (October 28, 2014) — Dr. James Kadtke, Special Advisor on Converging Technologies for the Center for Technology & National Security Policy, will speak at upcoming Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), forum where cyber security experts are set to discuss topics such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Dr. Kadtke served as the Chief Scientist at Nonlinear Solutions, Inc. and a consultant to the Department of Defense and private industry on defense science. From 1999 to 2001 he was a AAAS Fellow at the Rand Science and Technology Policy Institute, supporting the White House Office of Science and Technology Policy, and afterward spent a year on the Science Committee in the US House of Representatives. He then served over three years on the staff of Senator John Warner of Virginia, where he handled technology, defense, and homeland security issues, and as staff designee on the Senate Armed Services Committee. More recently, he has served as Executive Director of the Accelerating Innovation Foundation, a research fellow at the National Defense University and George Mason University, and a consultant to the government on policy and research in the defense, technology, innovation, and homeland security areas. Until November 2012, he was the Industry and State Liaison at the National Nanotechnology Coordinating Office, which supports the National Science and Technology Council under the White House.

Dr. Kadtke received his Ph.D. in theoretical physics from Brown University in 1987, which included two years as a graduate fellow at Los Alamos National Lab, and then spent over ten years as a research faculty at the University of California at San Diego. He is a consultant in the Washington, DC area focusing on emerging technology, organization foresight, and innovation, and their effects on future economies, governance, and international security.

About Cyber Security World Conference 2014
Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact us by sending an email to information@goldennetworking.com.

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
jpetrova@goldennetworking.com
http://www.goldennetworking.com

Risk Management Technology Leader Robert Gardner to Keynote Cyber Security World Conference 2014

Golden Networking

Golden Networking brings Cyber Security World Conference 2014 New York City (www.CyberSecurityWorldConference.com), forum that will provide the latest thinking from dozens of security experts to hundreds of senior executives focused on protecting today enterprises’ information assets.

Mr. Robert Gardner

New York City, NY, USA (October 23, 2014) — Robert Gardner, founding partner of New World Technology Partners (NWTP), will keynote upcoming Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), unique forum where cyber security experts are set to discuss topics such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Mr. Gardner’s presentation, “The Enterprise Impact of Cyber Risk – through the Shareholder Lens,” is based upon 40 years of study and practice of cyber assurance. Beyond the security that can be achieved by responsible cyber hygiene (which we still do not practice, but can prevent 75% or more of the problem), according to Mr. Gardner, critical infrastructure and national leaders must consider two paradigm shifts in their risk management thinking:

1. The cyber eco-system underpinning their enterprise is not what they think it is – it has become a real-time complex system of systems – where runaway complexity presents systemic risks and exploitable vulnerabilities, which may have immediate, irreversible stakeholder consequences. (i.e. before the next 10Q or congressional hearing)

2. It can be managed by isolating the most consequential incidents – quantifying and prioritizing (aka Risk Triage) their financial, reputation/political and legal/regulatory exposure – which can be achieved by several old ( Bell Labs vintage system engineering analyses) and new (socio-political sentiment analysis) techniques.

However the C-Suite and their Boards must really get into the game to set the tone and become Cyber Exposure savvy, says Mr. Gardner. He has been a leader in cyber and critical infrastructure risk management technology and an incubator of technology enterprises since the mid-seventies. Mr. Gardner managed/participated in the launch of several development stage companies formed around those technologies, including August Systems, Verdix, Meiko Scientific, Cryptek, Phoenix Numeric and Probity Labs.

• Formed The Probity Group to provide enterprise risk analyses for executives regarding complex systems and critical infrastructure risk. Coordinated development of Gradient™ technology to quantify systemic risk causes and consequences for commercial, federal and international enterprises.
• Incubated iRISK™ Enterprise Risk Management methodology for a Fortune 500 enterprise to quantify the financial and public reaction (brand) consequences of cyber risk affecting shareholder and national security interests. Underlying intellectual property was vetted by industry, government and academic leaders in Energy, Financial Services, Chemical and Homeland Security communities.
• Rebuilt security division of a public company which developed the first B2 Multi-level Secure (MLS) Network evaluated by NSA, and spun it off to a public secure communications company. Arranged financing and managed turn-around of the merged company. Strengthened secure products portfolio for U.S. and International markets, which reversed losses and achieved rapid profitability. Coordinated sale of company to prominent U.S. hedge fund.
• At a mid-cap DoD service provider, he created an intellectual property incubator which introduced Trusted TeamWorks™ and other cyber risk innovations.
• Incubated Supercomputer technology into products for U.S. operation of a U.K. parallel processing company. Successfully competed for high visibility Government and Industrial accounts, and was awarded the 1991 Northeast Small Business Prime Contractor of the Year recognition.
• Member of startup team which developed NASA’s Software Implemented Fault Tolerance (SIFT) technology, pioneering Triple Modular Redundant (TMR) fault tolerant control systems. Business achieved success among International energy companies and Government Agencies. Subsequently spun off and acquired by ABB, which still operates 1000s of systems.

Prior to forming NWTP, he held senior engineering and technical marketing positions for ILLIAC IV, PEPE, LDSP and NASF supercomputer projects at Burroughs Corporation, for which he received numerous technical and market accolades and awards.

He often writes and speaks on topics regarding intellectual property and has prepared briefings and testimony for the U.S. House of Representatives and Senate caucuses on the technology impact on Financial (TARP) Infrastructure and The “First Three Hours” Emergency Response Methods.

Mr. Gardner also teaches business planning for artists at New York City’s “Third Ward” creative incubation center, and assisted formation and governance of New York based arts enterprises, including The Brick Theater and In The Pocket NYC. He has a BSEE from Rensselaer Polytechnic Institute and studied graduate system engineering and business administration at Penn State and the University of Santa Clara respectively.

About Cyber Security World Conference 2014
Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact us by sending an email to information@goldennetworking.com.

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
jpetrova@goldennetworking.com
http://www.goldennetworking.com

Edgar Perez to Discuss Suspended China-US Bilateral Dialogue at Cyber Security World Conference 2014

Golden Networking

Building off of the momentum of past successful conferences, Golden Networking brings Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), forum that will bring the latest thinking from security experts to hundreds of senior executives focused on protecting enterprises’ information assets.

Mr. Edgar Perez

New York City, NY, USA (October 21, 2014) — According to Reuters, China’s top diplomat told U.S. Secretary of State John Kerry that resuming cyber security cooperation between China and the United States would be difficult because of “mistaken U.S. practices”. Yang Jiechi, a state councilor overseeing foreign affairs, told Kerry in Boston the United States “should take positive action to create necessary conditions for bilateral cyber security dialogue and cooperation to resume”, according to a statement seen on the Chinese Foreign Ministry website on Sunday. “Due to mistaken U.S. practices, it is difficult at this juncture to resume Sino-U.S. cyber security dialogue and cooperation.”

Why is it so difficult for China and the United States to speak about cyber security will be the topic to be presented by Edgar Perez (http://www.mredgarperez.com), author of Knightmare on Wall Street, at Cyber Security World Conference 2014 New York City (http://www.CyberSecurityWorldConference.com), forum that will provide a platform for information security authorities and innovative service providers to distil their latest research for hundreds of senior executives focused on protecting enterprise and government valuable assets. Cyber security experts will discuss topics such as protecting individuals and companies against cyber-attacks, biometrics as the future of security, risks brought by mobile computing, and protecting corporate and national infrastructure against foreign attacks.

Mr. Perez is widely regarded as the preeminent global expert in technology and investing. He is the author of Knightmare on Wall Street and The Speed Traders and has been interviewed on CNN, CNBC, FOX BUSINESS, Bloomberg TV, CNN en Español, BNN, CCTV China, Bankier.pl, TheStreet.com, Leaderonomics, GPW Media, Channel NewsAsia’s Business Tonight and Cents & Sensibilities. Mr. Perez has been globally featured on FXFactor, Columbia Business, OpenMarkets, Sohu, News.Sina.com, Yicai, eastmoney, Caijing, ETF88.com, 360doc, AH Radio, CNFOL.com, CITICS Futures, Tongxin Securities, ZhiCheng.com, CBNweek.com, Caixin, Futures Daily, Xinhua, CBN Newswire, Chinese Financial News, ifeng.com, International Finance News, hexun.com, Finance.QQ.com, Finance.Sina.com, The Korea Times, The Korea Herald, The Star, The Malaysian Insider, BMF 89.9, iMoney Hong Kong, CNBC, Bloomberg Hedge Fund Brief, The Wall Street Journal, The New York Times, Dallas Morning News, Valor Econômico, FIXGlobal Trading, TODAY Online, Oriental Daily News and Business Times.

Mr. Perez has been engaged to present at the Council on Foreign Relations, Vadym Hetman Kyiv National Economic University (Kiev), Quant Investment & HFT Summit APAC 2012 (Shanghai), U.S. Securities and Exchange Commission (Washington DC), CFA Singapore, Hong Kong Securities Institute, Courant Institute of Mathematical Sciences at New York University, University of International Business and Economics (Beijing), Hult International Business School (London and Shanghai) and Pace University (New York), among other public and private institutions.

Mr. Perez was a vice president at Citigroup, a senior consultant at IBM, and a strategy consultant at McKinsey & Co. in New York City. Mr. Perez has an undergraduate degree from Universidad Nacional de Ingeniería, Lima, Peru (1994), a Master of Administration from Universidad ESAN, Lima, Peru (1997) and a Master of Business Administration from Columbia Business School, New York, with a dual major in Finance and Management (2002). He belongs to the Beta Gamma Sigma honor society. Mr. Perez resides in the New York City area and is an accomplished salsa and hustle dancer.

Cyber Security World Conference 2014 is produced by Golden Networking, the premier networking community for business and technology executives, entrepreneurs and investors. Panelists, speakers and sponsors are invited to contact Golden Networking by sending an email to information@goldennetworking.com.

Media Contact:
Julia Petrova
Media Relations Coordinator
Golden Networking
+1-414-FORUMS0
jpetrova@goldennetworking.com
http://www.goldennetworking.com