
Paul Dwyer
Biography
A certified industry professional by the International Information Systems Security Certification Consortium (ISC2) and the Information System Audit & Control Association (ISACA) and selected for the IT Governance Expert Panel.
Paul’s credentials include:
• -Qualified Hacker
• -SOX (SAS70) Auditor
• -ISO 27001 Lead Auditor
• -BS2599 9 / BCP Expert
• -Forensic Investigator
• -PCI DSS Specialist
• -Prince2
• Project Manager
• -ISO 38500
Originally a technical network guru, Paul’s career developed from IT Manager of a large legal firm to senior designer of the network operation centre’s for EuroControl (Air Traffic) in Luxembourg and communication hubs for Chevron Oil in Kazakhstan and Moscow. He has worked extensively around the world and trained with such organizations as the US Secret Service, Scotland Yard, FBI, National Counter Terrorism Security Office (MI5), is approved by the National Crime Faculty and is a member of the High Tech Crime Network (HTCN). As a successful serial entrepreneur he successfully built a number of security practices in the UK & Ireland and has worked with clients across many sectors including: Financial, Government, Public Sector, Telecommunications, and Pharmaceuticals.
Paul is a world leading Cyber Security GRC authority and provides advisory services to a number of organizations’ throughout the globe including Fortune 500, law enforcement, military (NATO) and more recently as an advisor to the Obama Administration on Cyber Threats in Europe. A prolific contributor to the industry and media, Paul is an expert public speaker and has authored a number of Executive Cyber Security GRC training courses. Paul is now a leader in Mandiant.
Speech Topic & Synopses
It is estimated that over 500 million people will use mobile banking services by 2016. Not to mention, online gaming, gambling, shopping and travel reservations. Of course there is also the “social” or should I say “networking” apps of choice.So we are all more increasingly reliant on a variety of Internet devices. In delivering an app or service to our device of choice there are many parts to the value chain. From the device manufacturer, OS, app developer, content provider, mobile operator to mention but a few.
The complex business challenge is to detect and prevent online fraud.
The increasing sophistication of fraud attacks means it is important for businesses to recognise their good customers, and to keep them protected.The mobile channel is growing at an unprecedented rate. That is great news for some. However, the anonymity and privacy regulations associated with mobile devices can make accurate fraud prevention and detection extremely difficult. I will outline the threat landscape in relation to mobile apps and discuss strategies to deal with detecting fraud and dealing with associated risks.