Join our network of non-profits, companies and individuals who believe social change can happen through design.

Become A Member

valerio anema

Tokyo, Level 20 Marunouchi Trust Tower - Main 1-8-3 Marunouchi Chiyoda-ku, Japan


Member since November 22, 2013

  • -showcase_image-10-a-6895_177_

    In late May, online security firm Trusteer, an IBM company, raised alarms about a new online banking Trojan it calls Zberp. According to Trusteer, more than 450 global banking institutions in the U.S., the United Kingdom and Australia have been targeted by this malware strain, which combines features from Zeus and Carberp, two well-documented banking Trojans.

    Just days earlier, global cyber-intelligence firm IntelCrawler warned of new point-of-sale malware known as Nemanja, which had reportedly infected retailers in nearly 40 countries.

    And news about recent evolutions in the mobile malware strain known as Svpeng also has caused concern. In May, Svpeng was found to have evolved from merely a banking Trojan to a malware strain equipped with a dual ransomware feature (see New Ransomware Targets Mobile).

    But with so many alerts about new and emerging malware strains and attacks, how should banking institutions respond? It's a growing challenge for information and security risk officers because one of the keys to mitigating cyber-risks is differentiating new threats from older ones.

    What's Real?

    While banking institutions have to take all emerging threats seriously, they should take most alerts issued by security vendors in stride, says financial fraud expert Tom Wills, director of Ontrack Advisory, a consulting firm focused on payments innovations.

    "It's mostly hype," he says. "Every time a new threat shows up in the media, this is the first filter I run. Mo...

  • Security officers who view threat intelligence and risk management as the cornerstone of their security programs may have advantages over peers who face constraints when it comes to taking advantage of the available data.

    CISOs are generally tasked with evaluating security controls and assessing their adequacy relative to potential threats to the organization, and its business objectives. Their role in cybersecurity risk management -- the conscious decisions about what the organization is going to do and what it is not going to do to protect assets beyond compliance -- is still hotly debated.

    The transition towards risk management is more likely for the 42% enterprises whose security officers report to executives (the board of directors or chief risk officers) outside of the IT organization, according to Gartner. The firm's analysts advise security officers to achieve compliance as a result of a risk-based strategy, but admit that "organizations have not kept pace."

    Equinix started to build a customized threat intelligence program about five years ago. The International Business Exchange data center provider uses threat intelligence along with risk assessment to do its "homework" before the company invests its resources in information security or agrees to IT requests from departments with different priorities.

    "It doesn't make sense to go and buy a piece of [security] equipment because somebody in sales and marketing says, 'This is a big deal for...

  • One of the main involvements of Dyman & Associates is in the field of Project Management. Here is a brief Q&A that will provide essential information about this service:

    Q: What particular aspects of Project Management does Dyman & Associates engage in?

    A: Here is a list of Dyman’s involvement in project management:

    Remediation Project Management – Dyman assists companies comply with audit-process requirements to make them stay viable.

    Data Center Transfer – Dyman reduces downtime risks on clients’ systems and unmet goals during data-center relocation within one site.

    Business Continuity – Dyman assures clients of unhampered delivery of their methods and materials during disruptions in vital operations.

    Business Impact Analysis – By measuring the viability of each application through extensive interviews within the organization and analyzing the internal and external Service Level Agreements, Dyman can determine the overall health of a company and provide ways for improvement.

    Big-scale Technology Resets – Dyman helps clients avoid non-delivery of committed materials by improving cable plant, routers, switches, desktops, Wide Area Network, and others.

    Q: Do Dyman & Associates’ consultants have enough experience?

    A: Dyman & Associates Risk Management Projects senior-leaders have started from very humble beginnings; however, through the years, they have undergone sacrifice and applied diligence to succeed in both private and public ...

  • Bitcoin is a currency forged through hardcore mathematics and buoyed by promises of financial liberation from banks. Its climb has been very thrilling.

    Many are embracing bitcoin as a viable means of exchange and a valuable investment and it is rapidly increasing. Since it is free from meddling by central banks and what some view as untrustworthy financial systems.

    Satoshi Nakamoto, a pseudonymous programmer, developed the Bitcoin system. It was released a white paper in 2008 while in early 2009, the network launched uses peer-to-peer software to transfer bitcoins.

    Bitcoin is a purely digital currency; basically a secret number that is transmitted from one party to another using public key cryptography. The people running high-end computers that verify the transactions are called “miners”, they are awarded newly minted bitcoins for their efforts.

    One reason why this so called bitcoin is so attractive is that its distance from the established financial system and lack of regulation. Compare to those virtual currency projects that failed in the past years, bitcoin has so far defied predictions it would meet the same fate.

    Bitcoin “seems to resonate quite deeply” with people who don’t trust banks, even if the rosy predictions of its potential are baseless in standard economic theory, said Dick Bryan, a professor with the Department of Political Economy at the University of Sydney.

    No one can create an accurate economic model for Bitcoin, and everyone who th...

My Interests

  • Industrial Design
  • Environmental Design
  • Communication Design
  • Fashion Design
  • Audio/Visual Design