27
International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and Enterprise Risk Management

International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

Embed Size (px)

Citation preview

Page 1: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

International e-Financial WorldExpoNovember 19, 2004

Al DeckerExecutive DirectorEDS Security & Privacy Services

International e-Financial WorldExpoNovember 19, 2004

Al DeckerExecutive DirectorEDS Security & Privacy Services

Current Developments in Privacy and Enterprise Risk Management

Page 2: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

2

• Introductions

• Key trends in the management of risk

Challenges and opportunities

Best practices across the banking and financial services industry

• Dialogue on current issues

Identify theft

ATM fraud

PIN losses

Web-based fraud

Over-the-counter check fraud

• Next steps

AgendaAgenda

Page 3: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

3

The complexity of managing corporate risks is greater today than ever beforeThe complexity of managing corporate risks is greater today than ever before

• Cyber-crime/terrorism

• Money Laundering

• Privacy Issues

• Identity Management

• Counterfeit schemes

• Physical security

• E-Commerce fraud

• Fraudulent financial reporting

• Intellectual Capital Safeguards

• Investor confidence

• Liability

• Business Continuity

• Identity Theft

• Reputation loss

• Compliance with regulations

Phishing-related fraud cost banks and card issuers an estimated $1.2 billion last year. Sept, 2004 CIO

$10b to Credit Card fraud (Meridien)

$15b to Check Fraud (FBI, Meridien)

Page 4: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

4

Attacks from anywhere around the globe have become increasingly easy to launch and more destructive Attacks from anywhere around the globe have become increasingly easy to launch and more destructive

Sniffers

Auto Probes

Denialof

Service

Stealth Attacks

Distributed attack toolsStaged attack

Cross site Scripting

Low

High

1980 1985 1990 1995 2000

Intruder Knowledge

Attack Sophistication

Password GuessingDisable audits

Exploit vulnerabilities

Self-replicating code

Password cracking

Back doors

Sweepers

Session Hijacking

Virus management remains the number 1

“pain point” Gartner, 2004

Page 5: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

5

How do Security and Privacy differ? How do Security and Privacy differ?

Privacy

Security

AuthenticationAccess controlsAvailabilityConfidentialityIntegrity checksRetentionStorageBack-upIncident responseRecovery

HandlingMechanisms

“Right” of an individual

Fairness of Use

-Notice

-Choice

-Access

-Accountability

-Security

ProtectionMechanisms

Page 6: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

6

Leading companies are seeking effective risk management solutionsLeading companies are seeking effective risk management solutions

• Examining vulnerabilities across every aspect of their organizations including:

-Internet-exposed systems -Affiliates

-Wireless -Call centers

-Financial systems -Data

• Creating multi-vendor strategies for managing risk

• Linking all aspects of fraud prevention, monitoring and detection into an overall enterprise-wide risk management architecture

• Working with industry groups, government agencies, law enforcement and consumer groups to share information and devise solutions

• Creating a global risk management program with consistent practices and policies

Page 7: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

7

In 1998, Doerig defined “100 Financial Services Risks”In 1998, Doerig defined “100 Financial Services Risks”

100 Risks

In Financial Services

Regulatory

Interest

FX

Market

Strategy Documentation

Control Procedures

Control Environment

Outsourcing

Initiatives Overload

Flexibility

Event RisksInfrastructure Shutdown

Centralization Decentralization

Balance Sheet Structure

Data Integrity

Value Proposition

Take-OverRisk Ratings

Theft / Crimes/ Fraud Supervisory

Syndication Emerging Markets

Risk Capacity

Risk Control

Project

Insurance

Risk Culture

Future Commitments

Cadence of Change Channels / Internet

Change Management Competition

Motivation

Concentration

Deal Breakup

Political

MIS

Revenues

Critical Size Staff / Team Hackers

Know Your Client

Partnerships-Alliances Financial Models

Bridge FinanceLarge exposures

Catastrophe Settlement

Systems

Social Unrest

Refinancing

Compliance

New Business

Proportionality Intrusion

Transparence Cross Border

Counter party

Custody

Globalization

Legislation

Innovation

Collateral

Insider

Liquidity

Team Departures

Credit Spread

Pricing

Business Volume

Netting

AL Management Volatility

Priority Setting

Brand

Rogue Trading

Netting

Risk Appetite

Operations

Operations

Systemic Character

Commodity

Style

War

LegalKnow-How

Segmentation Culture

Project

Cadence of Change

Internet

ChannelsHans-Ulrich Doerig Vice Chairman of the Executive Board and Chief Risk OfficerCredit Suisse Group

Chart indicates Risk variety.All 100 risks have at least an "operational touch".

The greatest risk, however, is not taking one, as the chances for rewards move towards zero.

Page 8: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

8

A logical bundling of risks is needed to set priorities

Enterprise Risk

Management

Credit RiskCredit Risk

Credit spread riskDirect credit riskCredit equivalent expenseSettlement risk

Business Event RiskBusiness Event RiskShift in credit ratingReputation riskTaxation riskLegal riskDisaster riskRegulatory risk

Execution orderProduct complexityBooking errorSettlement errorCommodity delivery riskDocumentation/contract risk

Exceeding limitsRogue tradingFraudMoney launderingSecurity riskKey personnel riskProcessing risk

Programming errorModel/methodology errorMark-to-market (MTM) errorManagement informationIT systems failureTelecommunications failureContingency planning

Communications failureTiming failure

TransactionRisk

OperationalControl

Risk

SystemsRisk

ProgramRisk

Op

erational R

iskO

peration

al Risk

StabilityStabilityMarket SensitivityMarket Sensitivity

Equity priceEquity priceEquity price volatilityEquity price volatilityEquity basis riskEquity basis riskDividend riskDividend risk

Interest rateInterest rateYield curve riskYield curve riskInterest rate volatilityInterest rate volatilityInterest rate basis spread riskInterest rate basis spread riskSpread riskSpread riskPrepayment riskPrepayment risk

FX rateFX rateFX volatilityFX volatility

Profit translation riskProfit translation riskCommodity priceCommodity priceForward price curve riskForward price curve riskCommodity basis spread riskCommodity basis spread risk

Economic sectorEconomic sectorInstrumentInstrumentMajor transactionMajor transaction

Market liquidityMarket liquidityLiquidity riskLiquidity risk

CorrelationRisk

LiquidityRisk

Equity Risk

Interest Rate Risk

Currency Risk

CommodityRisk

PortfolioConcentration

Mar

ket

Ris

k

Page 9: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

9

Financial Institutions should evaluate the changing landscape in the context of their specific risksFinancial Institutions should evaluate the changing landscape in the context of their specific risks

Identity theft/Phishing

ATM fraud

PIN losses

Web-based fraud

Over-the-counter check fraud

•Need to be tied to a business purpose

•Need to show value from reduction of loss or operational cost

•Need to be relevant

•Need to be cost justified

Page 10: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

10

Identity theft is one of the fastest growing white collar crimes in the USIdentity theft is one of the fastest growing white collar crimes in the US

• An ABA Check Fraud Survey found that $3 out of every $4 lost by a community bank to check fraud was due to some form of identity theft

• 4 out of the top 5 consumer complaints regarding identity theft involve financial services

– New credit cards accounts opened

– Existing credit card accounts used

– New deposit accounts opened

– Newly obtained loans

• Consumers suffer much more from new account fraud than from payment (typically credit card) fraud

• Thieves have only a 1 of 700 chance of federal arrest

Gartner 2004

Page 11: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

11

Phishing - one method to obtain personal informationPhishing - one method to obtain personal information

Increase in phishing attacks from December 2003 to June 2004:

1,126%

Phishing could SLOW the growth of e-commerce in the by

1 to 2 % in 2005

Page 12: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

12

Other methods used to obtain identifying information Other methods used to obtain identifying information

• Pretext calling

• Stealing a wallet to use the information or provide contents to a crime ring

• Fish credit card or other information from dumpster

• Dishonest employees access computers connected to one of the credit reporting agencies

• "Insiders" use their access to personnel records to obtain SS numbers

• Underground bulletin boards

• Mail theft

• Change of address card diverts mail to the thief’s drop box. Postal Service has initiated changes to address this

• Application fraud - perhaps a pre-approved offer of credit retrieved from the trash with the victim’s identifying information – the credit card mailed to another address

• Web sites that sell individuals’ Social Security numbers for as little as $20

Most victims do not know how their identifying information was obtained

Page 13: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

13

ATMs provide access to millions globallyATMs provide access to millions globally

• With the increase in ATMs, comes an increase in criminals looking to take advantage of the technology for personal gain

• ATM fraud is specifically a crime that would not have occurred but for the presence of the ATM

• Requires new strategies, processes and new laws to cover the crimes

1. ATM Card and/or PIN stolen

2. Active ATM card left in the machine

3. Deposit empty envelope

4. False reporting of transaction problem

5. Physical attack on the ATM

6. Robbery at ATM

7. Wiretap on communications links

8. Manipulation of ATM and/or its system software

9. Surveillance, photograph of PIN

Page 14: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

14

Card fraud and PIN loss prevention strategiesCard fraud and PIN loss prevention strategies

• Authentication of identity before issuance of card

• Protection against stolen cards and PINs

• Protection against counterfeiting

• Lower transaction floor limits at which bank authorization is required

• Card Restrictions

• Terminal safeguards

• Improve cardholder verification

• Improved cryptography

• Fraud Detection Software

•Stored Value (Smart) Cards

•Debit Cards

•Credit Cards

Common Vulnerabilities

•Lost or Stolen

•Alteration and Counterfeiting

•Issuance (fraudulent application)

•PIN Fraud

•Misuse (Exceeding cash transaction and credit limits)

Page 15: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

15

Web Based Fraud - US leads the world in eCommerce fraud with 47.8% of worldwide fraudulent transactionsWeb Based Fraud - US leads the world in eCommerce fraud with 47.8% of worldwide fraudulent transactions

• Two major threat types:

– Applications

– Networks

– IT, Business application owners, and fraud managers should work together to understand the threats

• Online banking fraud

– Identity Theft

– Friendly Fraud

– Internal Fraud (Can be the most costly to financial institutions)

• Combination of technology and sound banking practices are essential

– Identification, Authentication, Validation, Monitoring activity, Tracking losses, Training

• New account openings

• Post authentication setup

• Banking enrollment

• Bill payment services

Adopt a consistent and standard definition of “Internet Fraud”

Page 16: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

16

Authentication is Key as access increases to more users, from more locations, using more types of devices Authentication is Key as access increases to more users, from more locations, using more types of devices

• Identity Management will be critical

– The ability to manage (create, modify, delete) all user accounts, user profiles, etc. that can be identified with each person across the heterogeneous IT environment via a combination of user roles and business rules

– The ability to automatically correlate data from HR, customer relationship management (CRM), e-mail systems (and other “identity stores”), and from the managed systems

• Access Management will be the foundation

– Manage (across multiple target systems) an access control policy (or policies), including both policy administration and enforcement.

Page 17: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

17

The problem with access is managing the multiple identities from multiple channelsThe problem with access is managing the multiple identities from multiple channels

jbakerbigdaddy

jbaker257gonefishin

j_baker123456

•Identity Management will be critical•Access Management will be the foundation

Manage (across multiple target systems) an access control policies including administration and enforcement.

Page 18: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

18

Privacy and Identity Management Survey Privacy and Identity Management Survey

Objective: To understand the evolving privacy and identity management requirements of consumers and Chief Privacy Officers

Consumers choose convenience over security, while still expecting security. Evidenced by:

•61% do not want to be forced to change passwords.

•57% do not want their accounts locked down after three failed attempts to log on or provide ID verification information.

•74% want to be transferred to a supervisor for assistance and access if they can convince the supervisor of their identity.

•88% of those that were open to biometrics cite convenience as the main factor in moving to biometrics so they will not have to remember passwords.

Page 19: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

19

69% of consumers are open to using biometrics in Identity Management 69% of consumers are open to using biometrics in Identity Management

• Only 12% said no to biometrics; the remaining 19% are unsure.

• The consumers who will accept the use of biometrics gave these reasons;

88%

56%69%

0%10%20%30%40%50%60%70%80%90%

100%

Convenience,because I won’t have

to rememberpasswords

My information wouldbe more secure

Speed up mytransaction

Page 20: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

20

Business issues will drive the identity and access management solutionBusiness issues will drive the identity and access management solution

• Regulatory Compliance– GLB, HIPAA, SOX

• Business Facilitation– Self-registration

– Portal and personalization

– CRM and retention

• Cost Reduction or Containment– Reduce/avoid staff

– Common IAM architecture

• Operational Efficiency– Improved SLA <24 hrs

– Productivity savings

– User convenience

– SecAdmin reporting

• Risk Management– Audit

Every enterprise will need a centrally managed user identity and access management system

Page 21: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

21

Where to look for vulnerabilities Where to look for vulnerabilities

• People– New hires/terminations

– Employee fraud

– Unauthorized activity/employee misdeeds

– Loss or lack of key personnel

– Loss of laptops, PCs, PDAs

• Processes– New account opening and Account

maintenance, such as name or address changes and closings

– Credit and collections processing

– Compliance failures

– IT and business project/change management

– Business impact assessments

• Systems– Comprehensive security

management and monitoring

– Data encryption

– Systems development and implementation

– New technologies

– System failures/slow responses/ lack of market performance

– Systems security breaches

• External– Contractors/outsourcers

– Agents acting on behalf of the company

– Supply chains, partners

– Customers, consumers

Page 22: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

22

Goal is to understand where problems can occurGoal is to understand where problems can occur

• Data During Collection– Agencies, mail– Call Centers – Internet sites– Mobile Hot Spots

• Data at Rest– Mainframe, Mid-Range, Servers– PCs, PDAs, – Wireless devices, including Cell Phones

and GPS enabled devices– Fax– POS, Kiosks– Internet accessible devices– Off-site storage and retention

• Data in Use– Service delivery via mail/email/phone– Service via branches, call centers and

operations centers– Collection and Recovery

• Data In Transit– Mail– Email– Fax– Wireless – Files via VPN– Files via FTP– Data via Courier

• Retiring Data– Shredding– Electronic “Shredding”

• Data at agents, outsourcers/suppliers

– Data During Collection– Data at Rest and In Transit– Data In Transit and when Retiring

Page 23: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

23

A well-designed risk-management framework will include: A well-designed risk-management framework will include:

• Risk Management Strategy - Senior management must:

– Sponsor and determine its vision, goals and key performance indicators and effectively communicate these strategies

• Risk Management Program Development

– Create a office to oversee and drive initiatives

• Policies, Procedures and Standards

– Must be developed, implemented and communicated to effectively support the risk management program

• Operations and Management

– Processes created to effectively implement, maintain and monitor the policies, procedures and performance objectives

• Applications Infrastructure

– Ensure applications have measures that support transaction security and privacy

• Technology Infrastructure

– Information technology designed and configured to lessen the risks in processing environment

Page 24: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

24

The future of Internet Security will need to address:The future of Internet Security will need to address:

New Attackers

• Professionals with Different motivations

New Threats

• Greater speed and destructive capabilities

New Platforms

-Web Services -Instant messaging (IM)

-Wireless -Broadband

-Peer-to-peer -Grid computing

New Solutions

• More proactive systems that provide first-strike protection

Exposing the Future of Internet Security

April 8, 2003 Robert Clyde

Page 25: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

25

On the Horizon…. On the Horizon….

• Increased global and industry specific regulation

• Boards of directors and executive management will pay closer attention to their risk governance responsibilities

• ISO17799 will undergo revision as the de facto standard for defining an information security program/architecture

• Organizations will need to boil the myriad of standards and regulations requirements down into a common nomenclature

• This will drive a renewed interest in Generally Accepted Information Security Principles (GAISP)

• Increased focus on certification and accreditation of system security before production implementation

• IT Security Industry is fragmented but moving towards convergence due to market demands which should increase efficiencies and decrease redundancies

• Common Criteria product certification will be more widely pursued and recognized

• Development of a continuous assessment process to manage risk on an ongoing basis

• Privacy and Security institutionalized into business operations

Page 26: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

26

We live in “interesting” times…..We live in “interesting” times…..

Bill Cheswick on who will win the virus wars

– “There will soon be a virus out there that the virus guys won’t be able to detect” 

• Stephen Crocker on Denial of Service

– “I Think denial of service attacks are going to get worse - much worse.”

• Mark Graff on the frequency of Internet based attacks

– “Very, very soon, it will not be useful to talk about individual attacks at all, but rather about the cluster of pathogens that are trying to get into our networks.” 

• And Bruce Schneier on present day security

– “No one can guarantee 100% security. But we can work toward 100% risk acceptance.”by Ed U. Kaishun

It only seemed like ye sterday that Atlanta Public Schools (APS)made headlines for negative reasons: disrepair of facilities, decliningstudent achievement, rising drop-out rate, etc. Remarkably, APS isnow continually featured in positive headlines. Since its nadir in thelate 1990’s, APS has taken steps to raise academic standards andexpec tations for Atlanta’s children, produce graduate s much better

AP RIL 2, 2001

FINAL

“Your Company” a victimof Cyberspace crime againThird time in Two Weeks Could it have been prevented

prepared for successful careers and low er the drop-out ra te to 10%.In a news conference last w eek, the Mayor publicly congratulatedthe APS faculty, the Atlanta School Boa rd, and the Superintendenton a job well done at the Fifth A nnua l Atlanta Public Educa tionSummit. Since the beginning of this year, APS has rece ived similaraccolades from the Georgia Board of Education, the Governor andthe Business Roundtable, an educational advocacy grouprepre senting 200 U.S. corporations.

This begs the question – H ow did this remarkable turnaroundoccur? We went looking for the answer to this question. Many inAtlanta point to the collective efforts of APS and the Metro AtlantaChamber of Commerce in 1998 as the watershed event.

In the winter of 1998, the Education Committee of the Chamberassembled a Specia l Task Force on Education. This task forceserved to identify how Atlanta’s business community could bestsupport A tlanta Public Schools in generating more employablegraduates.

According to Odie Dona ld, then cha ir of the EducationCommittee, “Unlike other efforts to narrow the gulf between APSand the Business Community, the Spec ial Task Force on Educa tionallowed both parties to w ork in true partnership for the benefit ofAtlanta’s children.” Adds Benjamin Canada, then APSSuperintendent, “APS was given a seat at the table, rathe r than be ing

trea ted a s a patient. As I look back on the early days of the Spec ialTask Force on Education, three significant things come to mind –strong leadership, unwavering commitment and accountability.”

As a result of APS’ remarkable achievements, the A tlantabusiness community has continued to signific antly support theschool district. Monetary, human and in-kind resources have beenstrategically allocated to e ffec t change. Additionally, ED UPACfunding has been earmarked to support the successful re-elec tioncampa igns of several school board members.

The initial ac tions of the Specia l Task Force on Educationserved a s a ra llying point to improve public education in Atlanta.Over the past five years, an expansive coa lition of organizations andeduca tional initiative s have complemented the effort. The resulttoday is sweeping changes in the city’s school district.

Annually, members of this education coalition come togethe r atthe Atlanta Public Education Summit, held by the Metro AtlantaChamber of Commerce. Important performance measures areanalyzed, improvements a re discussed and recognition is given toexemplary programs and coalition pa rtne rs.

$1,000 $1,100

$1,500

$2,200

$3,500

$0

$5 00

$1,0 00

$1,5 00

$2,0 00

$2,5 00

$3,0 00

$3,5 00

$4,0 00

1998 1999 2000 2001 2002

Online AttacksRevolution WithinPublic Schools

“Unl ik e other efforts to narr ow the gul f

between AP S [A tlanta P ublic Schools] andthe Busines s Comm unity, the Special Task

Force on Education al lowed both parties towork in true partner ship for the benefi t o f

Atlanta ’s c hi ldren”

— Odie Donald, President and CEO,BellSouth Corporation

“The tas k force adopted a dual focus.

Not only d id we concentrate on assistingthe Atlanta P ublic Schools in producing

more employable graduates, we a ls ofoc used on bringing forth m or e employable

AP S graduates”

— Gary Lee, Jr., former task member, retired VPand Executive Director of the UPS Foundation

“AP S [Atlanta P ublic Schools ] was g iv ena s eat at the tab le , rather than be ing

treated as a patient. A s I look back on theearly days of the Spec ia l Tas k Forc e on

Educ ation, thr ee signi ficant things cometo m ind — strong leadership , unwav ering

comm itment and accountabi lity”

— Dr. Benjamin Canada,Secretary of Education

by Jane Doe

This inaugural issue celebrates how

Atlanta Public Schools transformed itse lf intoa world-class school district. It may serve as a

template to othe r municipalities on how to

make significant improvements in publiceduca tion.

The va ried contributors to this specialedition of The Atlanta Journa l-Constitution’s

Guide to A tlanta Public Education reflect the

city-wide coalition re sponsible for theseremarkable results.

Contributors:

Atlan ta P ubl ic S cho ols

Atlan ta Boa rd of E duc ation

Metro A tlanta Cham ber ofCom me rc e

Atlan ta Com mi tte e for P ubli cE duc ation

Mayo r’s Renai ssanceCom miss i on

Atlan ta P artners for E du catio n

Atlan ta’s Bus in ess Com mu nity

Atlan ta’s No n-P rofi t Agen cies Public education in Atlanta: Much has changed in five years

Inside This Issue

Interv iew with th e Atlan ta Pu blicSch ools Superintenden t . . . . . . . . . . 3

“Revo lu tion within APS”:5 Year Ch rono lo gy of Events(19 98-Presen t) . . . . . . . . . . . . . . . . . . . 4

Per spectives: Stud ents, Faculty,Par ents, C ommunity Partner s . . . . 5

Washington Post

Bruce Schneier

pzhsh6
Page 27: International e-Financial WorldExpo November 19, 2004 Al Decker Executive Director EDS Security & Privacy Services Current Developments in Privacy and

Thank You!