Winning the War on eCrime – the Fight Continues

The Forum invited members along with a representative from the Police Central eCrime Unit (PCeU) and McAfee to discuss the cybercrime threat landscape and ways of working together in the future.

Summary

This year an increased number of large corporate organisations participated in the Information Security Service (tISS) eCrime Survey 2009, the results of which have recently been released. Although most organisations are reasonably confident that they have a sufficient budget, they tend to be very concerned with the volume, complexity and alarming rate at which security threats are increasing. By and large corporate spend on IS (Information Systems) security has held up well, with 66% of respondent organisations maintaining the level of spend, while 23% have increased budgets slightly.
There are growing concerns about eCrime largely due to the recession and the growth of sophisticated attacks, especially from Eastern Europe and China. Targeted infection by malicious software (malware) is a growing concern and this is seen as a high priority for the coming year, particularly malware on customers' machines for internet retailers.
The survey also indicates increased worries over insider threats, whether deliberate or otherwise. Internal sabotage, wireless network abuse and external intrusion resulting in theft of information/data, although not commonly experienced yet, are currently a cause of concern and predicted as high priority threats for the future.
Another area of increasing concern is the use of bogus company websites by criminals to defraud the public, resulting in loss of reputation by companies. Targeted system attack by unauthorised outsiders, telecoms fraud and financial fraud remain common, but have decreased slightly from last year. The theft of IT equipment, although common, is not regarded as a high priority for the next couple of years.
For more details read the full tISS eCrime Survey 2009 Report.
The 'Winning the war on eCrime - the fight continues' workshop consisted of presentations given by two leading industry experts and a group discussion/Q&A session. The workshop was attended by 13 delegates from a wide cross-section of ten organisations.
Log in to access the full resource or buy it for £175 +VAT   

Information request

I'd like to know if my organisation is already a member
Sign me up for the monthly newsletter
Name*
Company*
Job Title*
Email*
Telephone
General enquiry or comment?
12191112
Sum the two numbers in white
and enter the total value below


Unparalleled Learning

Members Include

dmg-media-logo-colour-RGB-WEB-250px
johnlewis
mcdonalds
united biscuits
travis perkins
southwestwater
rexam
landregistry
HMRC
gchq
eon
dhl
EnvironmentAgency
BalfourBeatty
coop
BAE
aviva
01/17 
start stop bwd fwd

"Just wanted to say thanks; another great day where I have come out with more knowledge than I entered with"

"Many thanks; [the event was] very good and beneficial"

"I have never not found a day interesting"

"The Corporate IT Forum is a fantastic level check, free of vendor sell and consultancy hype. I like the open sharing of experience…"

"We get valuable knowledge and experience from members of The Corporate IT Forum. This helps us to make better and informed decisions to reach our business goals…"

"The knowledge from other people on what they are doing/have done is invaluable to my team"

"The workshop validated the marketplace for supplier apps; participants were of a uniformly high standard; personally, I value highly the ethos of the Forum in the fact that it is supplier independent"

Tel: +44 (0) 1442 866634
info@corporateITforum.com

Reports

Output reports from Workshops, Webinars, Summits and Conferences

Related Content

  • HDX Flash Redirection (Q&A Feb 2014)
  • IT Risk and Service Continuity Management (Report Jan 2014)
  • Cybercrime Resources (Q&A Nov 2013)
  • tISS: The Threat Landscape (Report May 2013)
  • IT Risk Management (Reality Checker Feb 2013)
  • tISS: Security Strategies & Metrics (Reality Checker Nov 2012)
  • Change Management - Scheduling & Risk (Q&A Mar 2012)
  • tISS: IT Security Risk Management (Report Jan 2012)
  • IT Risk Management (Reality Checker Dec 2011)
  • Chinese Office Communications (Q&A Aug 2011)
  • Brand Monitoring Services (Q&A Apr 2011)
  • eCrime Survey 2011 (Reality Checker Mar 2011)
  • tISS: Cryptography - Tackling the latest Challenges (Report Jan 2011)
  • tISS Malware & Threat Perception (Reality Checker Dec 2010)
  • Governance in an Outsourced Environment (Report Sep 2010)
  • Banner
    Banner