contents

business
 
Tokyo eCrime Conference Press Event, May 22

The Anti-Phishing Working Group (APWG) will preview its Counter-eCrime Operations Summit (CeCOS II) to be held in Tokyo, Japan, May, 26-27, during a high-level press conference May 22 in Tokyo.

CeCOS II will survey the technical advances of phishing and ecrime groups and benchmark the kinds of technical, operational and policy responses that have proven useful in countering them from the desktop all the way back to domain Registry.

CeCOS II will bring together business leaders, IT operations, Internet Security technologists, public policy officials, and law enforcement from around the world to prioritize plans in a global confrontation against phishing and forms of Internet fraud perpetrated against consumers and enterprises.

CeCOS II is co-hosted by the APWG and the Council of Anti-Phishing of Japan. The Council of Europe's Economic Crime Division at the Directorate General of Human Rights and Legal Affairs is a Program Partner. Industry sponsors include Hitachi Information Systems, Ltd., SecureBrain Corporation, Kaspersky Labs Japan and Microsoft. The Japan Network Security Association and other governmental agencies and associations have also joined as supporting agencies to CeCOS II.

eCrime is spreading worldwide and changing, with reports coming into APWG indicating increasing geographic spread of ecrime and a deeper focus on corporate assets: bank accounts, customer data (for identity theft purposes) and trade secrets.

Identity theft and fraud dropped to $51 billion worldwide over the last year, down from a high of $58 billion in 2006, acccording to the Javelin Strategy & Research 2008 Identity Fraud Survey Report. However, the Computer Security Institute 2007 survey of enterprises, government agencies and universities found that the average annual loss reported by respondents doubled to $350,424 from $168,000 form the year before - with finanial fraud causing the greatest damage of all forms of reported adverse security events.

Governments, industry, and law enforcement are divided and too often uncoordinated in the global contest with criminal gangs that are extremely well connected and coordinated. APWG's CeCOS II event helps all counter ecrime elements from industry, including ISPs, banks, ecommerce providers, software vendors, security companies, national computer emergency response teams, government regulators, law enforcement (public agency and private industry) to unite and forge a global agenda.

CeCOS II will present experts from all relevant technical, industrial and law enforcement fields to point to approaches that would help coordinate a global response to ecrime in terms of industrial policy and emerging law enforcement paradigms.

CeCOS II highlights include:
- APWG is proposing its universal data format for industry and law enforcement to exchange electronic crime data and automate their processing, thus enabling better and faster-forming intelligence on electronic crime events and easing of forensic workloads.
- JOGA is presenting important insights on how fraud can be perpetrated through the online gaming universe, one that didn't exist 10 years ago and is now a burgeoning economy all its own.
- McAfee Avert Labs Japan will demonstrate how desktops are increasingly exposed to ever more intelligent crimeware and being tuned for different regions and for specific applications, effecting everyone who owns and operates a personal computer.
- HKDNR / HKIRC, Hong Kong, China's HK Registry is demonstrating how industrial policy can effectively neutralize criminal activity on the Web with a case study of literally thousands of criminal domains names being swept off the World Wide Web by the trail-blazing HK Registry.
- Trend Micro's security expert is presenting a proposal for organizing the way law enforcement and industry's reacts to electronic crime, proposing a comprehensive, coordinated response architecture.
- Baylor University's botnet expert is discussing the consequences of allowing electronic crime gangs to co-opt and control ever larger segments of the internet's reach and infrastructure into so-called botnets and proposals to stem their growth.



write your comments about the article :: © 2008 Computing News :: home page