ismg.events Open in urlscan Pro
141.193.213.11  Public Scan

Submitted URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWh-7gEXzdjqjEj31wedWYvMg0wUqaW96tR4TFc-I1Yl98a_0sfzHupkOWNLUSNyPj_qh85Rs=
Effective URL: https://ismg.events/summit/financial-service-2024/?utm_source=Marketo&utm_medium=FullAgenda_HTML&utm_campaign=Engage...
Submission: On November 04 via api from IN — Scanned from IT

Form analysis 1 forms found in the DOM

Name: Subscribe-FooterPOST

<form class="elementor-form" method="post" name="Subscribe-Footer">
  <input type="hidden" name="post_id" value="5731">
  <input type="hidden" name="form_id" value="21b9e35">
  <input type="hidden" name="referer_title" value="Cybersecurity Summit: Financial Services New York">
  <input type="hidden" name="queried_id" value="21427">
  <div class="elementor-form-fields-wrapper elementor-labels-above">
    <div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-75 elementor-field-required">
      <input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-xs  elementor-field-textual" placeholder="Email" required="required" aria-required="true">
    </div>
    <div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
      <div class="elementor-field" id="form-field-field_4cf4815">
        <div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-x5432bbtd51u" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&amp;co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&amp;hl=it&amp;type=v3&amp;v=-ZG7BC9TxCVEbzIO2m429usb&amp;size=invisible&amp;badge=bottomright&amp;sa=Form&amp;cb=fmrwtb6rytxo"></iframe>
            </div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </div>
    </div>
    <div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-30 e-form__buttons elementor-sm-33">
      <button class="elementor-button elementor-size-sm" type="submit">
        <span class="elementor-button-content-wrapper">
          <span class="elementor-button-text">Send</span>
        </span>
      </button>
    </div>
  </div>
</form>

Text Content

Skip to content
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About

Menu
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About


NOVEMBER 7, 2024


CYBERSECURITY SUMMIT NY:
FINANCIAL SERVICES


HOSTED BY BANKINFOSECURITY


8:30 AM ET - 5:00 PM ET

Register Now
View Agenda

Overview
Topics
Agenda
Speakers
CPE Credits
Register

Overview
Topics
Agenda
Speakers
CPE Credits
Register



EVENT OVERVIEW

ISMG’s 2024 Financial Services Cybersecurity Summit will address the most
pressing cybersecurity challenges facing the financial sector. The keynote panel
will feature CISOs from leading firms reflecting on how the responsibilities of
InfoSec leaders have expanded to encompass not only IT infrastructure but also
the security of enterprise-wide data, communications, and operations. This
conversation will emphasize the growing strategic importance of cybersecurity
across all organizational levels.....

Across a full day of engaging sessions, our esteemed speakers will offer deep
insights into advanced threat intelligence, payment fraud prevention, the
transformative impact of AI for threat actors and defenders alike, and how to
leverage cyber insurance as a critical component of risk management. Attendees
will gain practical, actionable knowledge to strengthen their defenses against
emerging cyber threats.

The event will culminate in our highly interactive Solution Room workshop, an
interactive incident response session where participants will be thrust into a
high-stakes deep fake incident scenario, allowing them to apply key strategies
and tools in real-time to enhance their organizations’ crisis planning and
incident response frameworks.

View our ISMG Event Experience video to see what your peers are saying about
their participation. 

Download our Summit Brochure




VENUE


NEW YORK MARRIOTT DOWNTOWN

85 West Street at Albany Street New York, NY 10006

NOTE:  All requests to attend will be reviewed by event staff and approved based
on professional qualifications and event capacity.


HIGHLIGHT TOPICS

 * Critical Infrastructure
 * Incidence Response
 * Supply Chain Threats and Response
 * Cyber Attacks
 * Zero Trust

Register


DAVID ANDERSON

Vice President, Cyber, Woodruff Sawyer


VLAD BRODSKY

SVP, Chief Information Officer, OTC Markets Group


ANTHONY SCAROLA

SVP; Director of IT Governance, Risk & Compliance, Apple Bank


ERIKA DEAN

CSO, Robinhood


ALI KHAN

CISO, Better.com


MICHAEL WOODSON

Information Security and Privacy Director, Sonesta Hotels


KEVIN LI

CISO, Cohen & Steers


CARLOS SUAREZ

Deputy Information Security Officer, Helaba


MATANDA DOSS

Executive Director - Cybersecurity and Technology Controls, JPMorgan


ERIC BOATENG

CISO, MassMutual


BORIS KLYUCHNIKOV

Special Agent, Cyber Crime Task Force, FBI


SETH ROSE

Supervisory Special Agent Group 06, U.S. Department of the Treasury/Cyber
Investigations Unit


SPEAKERS


THOUGHT LEADERS ON STAGE AND LEADING THE CRITICAL CONVERSATIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in Cybersecurity passionate about the latest tools and technology to
defend against threats 

View Faculty




AGENDA

You can now view or download a PDF version of the attendee guide.

Download Agenda



REGISTRATION AND BREAKFAST

7:30 AM - 8:30 AM ET


OPENING REMARKS

8:30 am - 8:40 am et
8:40 AM - 9:10 AM ET


ERIKA DEAN

CSO, Robinhood Markets


ERIC BOAENG

CISO, MassMutual


THE SHIFTING RESPONSIBILITIES OF INFOSEC LEADERS ACROSS FINANCIAL SERVICES

Across financial services, having a robust cybersecurity posture demands moving
beyond the traditional IT scope, and ensuring the security of client and
enterprise communications and data across every sector of the organization.

Although all employees share the responsibility for cybersecurity, Chief
Information Security Officers, Chief Risk Officers, and other senior security
leaders are at the forefront, confronting cyber threats directly. Simply put,
these essential responsibilities can no longer be regarded as back-office
functions; these roles have gained strategic importance due to the growing
sophistication of cybercriminals, their advanced tools, and the significant
financial implications at stake.

Key Discussion Points:

 * Strengthening Multifactor Authentication: Proactively implement robust
   authentication methods to prevent high-risk data breaches.
 * Mitigating API Security Risks: Integrate real-time monitoring and threat
   detection to secure APIs against emerging vulnerabilities.
 * Enhancing Cloud Security Protocols: Identify and address gaps in SaaS
   deployments to ensure comprehensive cloud protection.
 * Managing Vendor Risks Proactively: Develop and enforce stringent risk
   management frameworks for third- and fourth-party vendors to minimize
   exposure.

Erika Dean, CSO, Robinhood Markets
Eric Boateng, CISO, MassMutual



9:10 AM - 9:40 AM ET


JOANNA HUISMAN

SVP Strategic Insights & Research, KnowBe4


2024 PHISHING ATTACK LANDSCAPE & BENCHMARK

Our 2024 Phishing by Industry Benchmarking study analyzed a data set of 11.9
million users across 55,675 organizations with over 54.1 million simulated
phishing security tests.
This report highlights employee vulnerability by industry, revealing at-risk
users that are susceptible to phishing/social engineering attacks.
 
You will learn:
 
 * Phishing benchmark data for 19 industries and 7 geographical regions
 * Understanding who’s at risk/what you can do
 * Actionable tips to create your human firewall

Joanna Huisman, SVP Strategic Insights & Research, KnowBe4

9:40 AM - 10:10 AM ET


CHARLIE LEONARD

Principal SecOps Transformation Advisor, Palo Alto Networks


CHRIS HOLDEN

CISO, Crum & Forster


ERIKA DEAN

CSO, Robinhood Markets


SECOPS TRANSFORMATION - CYBERSECURITY AT SCALE

For over a decade, security leaders and architects utilized a disparate best of
breed point solution framework to solve their security challenges. This resulted
in bloated security architectures, overlap in capabilities and significant
security architecture and integration failures.
These failures impacted organization’s ability to scale to meet business demands
and reduced stability of the security architecture as environments and data
volumes grew. The use of AI driven detections, automation, endpoint security,
attack surface management and real-time threat intelligence application were the
moonshot achievements for security solutions like SIEM, but were never achieved.
 
Join this session to discuss:
 
 * Scaling to meet business demands and stabilizing your security architecture
 * Reimagining organizational  security operations programs based on
   standardization
 * Achieving the impossible with security information and event management

Charlie Leonard, Principal SecOps Transformation Advisor, Palo Alto Networks
Chris Holden, CISO, Crum & Forster
Erika Dean, CSO, Robinhood Markets

10:10 am - 10:40 am et


PERRAJU NADAKUDUTY

Director & Distinguished Engineer, Capital One


SECURING WORKFORCE IDENTITIES WITH MODERN FIDO AUTHENTICATION

Securing workforce identities is vital, but yesterday’s technologies are no
match for tomorrow’s cyber threats.

The FIDO authentication open standard offers the most modern defense tactic that
organizations can leverage to create digital barriers against evolving threats.
Learn how to raise the bar for security and innovation by driving
phishing-resistant and passwordless authentication and cultivate
phishing-resistant users across the enterprise.

Perraju Nadakuduty, Director & Distinguished Engineer, Capital One


NETWORKING AND EXHIBITION BREAK

10:40 am - 11:05 am et


11:05 am - 11:35 am et

Track A


DAVID ANDERSON

Vice President, Cyber, Woodruff Sawyer


UNDER THE CYBER HOOD: EXPLORING INSURANCE MYTHS AND REALITIES

In this compelling discussion, top industry leaders will unravel the
complexities of cyber insurance in an era of diversified and expanding risk.

 Panelists will provide a roadmap for CISOs to fully leverage cyber insurance,
safeguarding their security while clarifying its scope and debunking common
misconceptions about its effectiveness and sustainability.

The discussion will explore key factors that insurers consider during the
underwriting process, illustrating how companies can align their cyber insurance
strategy with broader risk management objectives. Special attention will be paid
to the strategic benefits of pre-breach services such as risk assessments and
vulnerability scans, and post-breach services like incident response and claims
support, which are pivotal in minimizing the impact of security incidents.

Key Takeaways:

 * Comprehensive Risk Management: Learn how to utilize cyber insurance as a tool
   for comprehensive risk management by integrating both pre-breach and
   post-breach services to enhance your cybersecurity posture.
 * Underwriting Insights for CISOs: Gain deep insights into the underwriting
   process, focusing on what insurers assess to help CISOs better prepare their
   organizations for favorable coverage.
 * Navigating Market and Regulatory Changes: Explore how shifts in the cyber
   insurance market and regulatory landscape affect policy offerings and
   coverage strategies, empowering CISOs to make informed decisions.
 * Optimization of Insurance Procurement: Discover strategies to streamline the
   cyber insurance acquisition process, improving how your organization
   approaches risk transfer and coverage optimization.

David Anderson, Vice President, Cyber, Woodruff Sawyer 

Track B


AARON SIMPSON

Partner, Hunton & Williams


SETH ROSE

Supervisory Special Agent Group 06, U.S. Department of the Treasury Cyber
Investigations Unit


MICHAEL WOODSON

Information Security and Privacy Director, Sonesta Hotels


NEW AGE OF PAYMENT FRAUD: HACKERS VS. HEROES

Across industries, the payment ecosystem faces unprecedented challenges from
increasingly sophisticated fraudsters. This session provides a comprehensive
exploration of the evolving landscape of payment fraud, shedding light on the
latest threats, detection strategies, and proactive measures to safeguard
financial transactions.
Join us as we delve into payment fraud prevention, examining rising threats such
as account takeovers and synthetic identity fraud. Our expert panel will explore
critical topics, including authentication techniques, data security practices,
and adherence to regulatory standards. Additionally, we will address the growing
risks associated with social engineering and the specific challenges faced in
securing mobile payments.
 
Key topics include:
 * The Evolving Face of Payment Fraud: Unpacking New Trends and Their Industry
   Impact
 * Uncovering Weaknesses in Digital Payments: Lessons from Real-World Exploits
 * Harnessing AI for Fraud Prevention: The Transformative Role of Machine
   Learning
 * Mastering the Maze of International Fraud: Tackling Cross-Border Payment
   Challenges

Aaron Simpson, Partner, Hunton & Williams

Seth Rose, Supervisory Special Agent Group 06, U.S. Department of the Treasury
Cyber Investigations Unit 

Michael Woodson, Information Security and Privacy Director, Sonesta Hotels

11:40 am - 11:50 am et


STEVE JACKSON

VP Sales East, Entro Security


RECLAIM CONTROL OVER YOUR NON-HUMAN IDENTITIES

Organizations large and small grapple with the challenge of the overgrowing
number of machine application identities as their cloud-native stack expands.

R&D teams create and scatter non-Human identities and secrets across vaults,
codes, collaboration solutions, and more without any oversight or control by
security teams. Non- Human Identity breaches are among the top two attack
vectors, and they are the most destructive.

What solution is needed to enable organizations to securely utilize non-human
identities and secrets? How can you detect, safeguard, and provide context for
NHI’s & secrets stored across vaults, source code, collaboration tools, cloud
environments, and SaaS platforms?

Introducing Entro – the complete platform for non-human identity & Secrets
management. With Entro, Security teams can finally efficiently oversee and
protect non-human identities with automated lifecycle processes and seamless
integration, ensuring comprehensive security and compliance through a unified
interface.

Steve Johnson, VP Sales East, Entro Security

11:50 am - 12:20 pm et


ED THOMAS

SVP, ProcessUnity


BEST PRACTICES FOR THREAT AND VULNERABILITY RESPONSE & EMERGENCY ASSESSMENTS

It's not getting any easier. Every time we turn around there seems to be another
attack or threat that demands our attention.
While each event is unique, they all result in third-party risk management teams
scrambling to ensure their organizations are protected. Rapid responses and
emergency assessments can be knee-jerk, stressful and distracting. It doesn’t
have to be that way.
 
Join us for a discussion on the best practices to responding to zero-day
vulnerability attacks and conducting emergency assessments. We’ll outline what’s
required to prepare in advance so you’re ready to execute when the time comes.
From establishing solid communication channels to leveraging automation, we’ll
cover the necessary steps and considerations for an effective response plan.
 
Session attendees will learn:
 * How to gain visibility into your entire vendor ecosystem and prepare in
   advance to reduce both reaction time and exposure to loss
 * How to quickly identify which third parties require follow-on action based on
   each specific threat actor or vulnerability
 * How quick-assess campaigns can automatically scope, distribute, and score
   responses

Ed Thomas, SVP, ProcessUnity


12:20 pm - 12:30 pm et


DARRYL JONES

VP of Product and Strategy, Ping Identity


WHAT'S NEXT IN CUSTOMER IDENTITY - REDUCING FRAUD WHILE IMPROVING EXPERIENCES

In an increasingly digital world, the need for robust customer identity systems
has never been more critical.

This, “What’s Next in Customer Identity: Reducing Fraud While Improving
Experiences,” explores innovative strategies and technologies aimed at enhancing
security without compromising user experience. We will delve into the latest
advancements in identity verification, such as biometrics and AI-driven
analytics, and discuss the balance between rigorous fraud prevention measures
and seamless customer journeys. By understanding emerging trends and best
practices, businesses can transform their approach to customer identity,
fostering trust, enhancing loyalty, and ultimately driving growth in a
competitive landscape. Join us as we envision the future of customer identity
management where safety and satisfaction go hand in hand.

 

Darryl Jones, VP of Product and Strategy, Ping Identity


12:30 pm - 12:40 pm et


BILL SOVAK

VP of Data Protection Sales, Fortra


ETHICAL WALLS WITHIN THE FINTECH COMMUNITY

Between PII, loan information, investment portfolios, and transactional data,
the financial services sector has no shortage of sensitive data.

For many businesses – investment banks, consulting firms, and countless fintech
companies – ethical walls are needed to form a barrier between departments to
block the exchange of this information.

While this can be done for privacy reasons, it’s also imperative to prevent
conflicts of interest and to comply with regulatory mechanisms. While new
technologies like Data Security Posture Management (DSPM) can be helpful for
providing visibility into where sensitive data resides, relying on a robust
suite of solutions designed to safeguard data can ensure it isn’t shared between
different lines of business, like retail companies and commercial banking.

In this chat, learn how Fortra’s Digital Guardian, Data Classification, and
Terranova Security can work in tandem to help organizations avoid data breaches
and secure sensitive data while complying with any information barriers that may
be in place.   

Bill Sovak, VP of Data Protection Sales, Fortra

12:40 pm - 12:50 pm et


VINCENT STOFFER

Field CTO, Corelight, Inc


EXPANDING HORIZONS: LEVERAGING NETWORK SECURITY DATA FOR FRAUD DETECTION BEYOND
THE SOC

Network data is critical for detection, response, and forensics for security
teams but there are use cases that stretch into the world of fraud.

Hear some anecdotes about how passively collected network data was harnessed to
alert security and fraud teams to anomalous behavior seen on application
traffic. See how Corelight’s data driven approach to NDR goes beyond the SOC and
into the most critical troves of data in the industry.

Vincent Stoffer, Field CTO, Corelight, Inc


LUNCH

12:50 pm - 1:35 pm et


1:35 pm - 1:45 pm et


CURTIS REYNOLDS

Senior Systems Engineer, NetWitness


DEFENSE ACCELERATED: HOW NETWITNESS IS REVOLUTIONIZING THREAT DETECTION,
INVESTIGATION AND RESPONSE

In today’s complex and ever-changing cybersecurity landscape, you need a
centralized platform to help analysts detect, investigate, and respond to known
and unknown attacks fast to mitigate the financial and reputational damage that
cyberattacks can cause.
Join us as we take you through a live demo to showcase how you can obtain:
 
 * Unsurpassed visibility by collecting data across all capture points (user,
   endpoint, edge, core, cloud) and threat intelligence sources to expose the
   full scope of attacks.
 * Faster threat detection and investigation by enriching network and endpoint
   data at capture time with threat intelligence and business context.
 * Smarter, faster analytics by providing behavioral analytics (UEBA) and
   automation and orchestration capabilities so analysts can follow consistent,
   transparent, documented processes for threat hunting and investigation.

Curtis Reynolds, Senior Systems Engineer, NetWitness

1:45 pm - 1:55 pm et


ERIK GASTON

Vice President, Global Executive Engagement, Tanium


AI: MANAGING EXCITEMENT & RISK | BALANCING INNOVATION, SPEED, SECURITY, AND
SHADOW AI IN FINANCIAL SERVICES

In today’s fast-paced financial service industry, AI adoption is transforming
how we operate, bringing both innovation and risk. As departments implement AI
solutions without governance Shadow AI emerges.

In this talk, we’ll explore the challenges of Shadow AI , the balance between
speed and security, and the remotion responses individuals and organization face
when navigating technological change. Join us to discover strategies for
combatting Shadow Ai while driving innovation and learn how industry standards
and future AI advancements will shape the next phase of adoption.

Erik Gaston, Vice President, Global Executive Engagement,

Tanium

1:55 pm - 2:05 pm et


ORIEL VATURI

CEO, Ovalix Security


FROM STRATEGY TO EXECUTION: GAPS BETWEEN TEAMS, TOOLS, AND PROCESSES

Misalignments between teams, tools, and processes drag organizations into
financial, security, and efficiency losses.

Unaddressed misalignments mean inconsistent processes, ineffective teams, and
underutilized tools, leading to widespread inefficiencies, governance gaps, and
increased risks of security breaches. Without clear and unified control over
these elements, organizations incur these hidden costs every day. Introducing
Ovalix: a unified platform for complete visibility and control over your
security landscape. Ovalix bridges the gap between your teams, tools, and
processes and ensures every aspect of your security strategy is optimized,
helping you reduce risks, close governance gaps, and improve overall efficiency.

Oriel Vaturi, CEO, Ovalix Security

2:05 pm - 3:05 pm et


BORIS KLYUCHNIKOV

Special Agent, Cyber Crime Task Force, FBI


SETH ROSE

Supervisory Special Agent Group 06, U.S. Department of the Treasury Cyber
Investigations Unit


RYAN ROOBIAN

Global Solutions Architect, Google Cloud Security


DEEP FAKES, REAL STAKES: UNMASKING CYBER DECEPTION IN A HIGH-STAKES TABLETOP
SIMULATION

Join us for this collaborative tabletop exercise, hosted by CyberEdBoard Google
Cloud.
This interactive session is meticulously crafted to mimic a sophisticated cyber
attack.
It aims to bolster strategic response capabilities and enhance operational
readiness against the backdrop of advanced cyber threats. The focal point of
this exercise is a strategically crafted deep fake incident targeting a
corporate executive, weaving together elements of social engineering, financial
fraud, and the challenges posed by emerging technological threats.
 
What You Will Gain From This Experience:
 
 * Enhanced Organizational Readiness: To critically assess and improve
   organizational preparedness in responding to intricate cyber incidents
   involving deep fake technology and social engineering.
 * Interagency Collaboration and Knowledge Exchange: To strengthen the
   partnership and information sharing between the sponsor and leaders in the
   private sector cybersecurity community.
 * Strategic Response Development: To create all-encompassing incident response
   strategies that cover legal, technical, and communicational facets, while
   also identifying and rectifying weaknesses in existing cybersecurity policies
   and governance.

 
Boris Klyuchnikov, Special Agent, Cyber Crime Task Force, FBI
Seth Rose, Supervisory Special Agent Group 06, U.S. Department of the Treasury
Cyber Investigations Unit
Ryan Roobian, Global Solutions Architect, Google Cloud Security


EXHIBITION & NETWORKING BREAK

3:05 pm - 3:30 pm et


3:30 pm - 4:00 pm et


RONALD ARDEN

Executive Vice President, CTO and COO, Fasoo, Inc


DATA SECURITY AND PRIVACY CHALLENGES IN THE AI ERA

The challenges to protect sensitive data and meet increasingly stringent privacy
laws and regulations is a daunting endeavor for financial institutions. The
dramatic increase in the use of LLMs and Generative AI has only complicated
matters.
Significant risks from insider threats, both malicious and unintentional, and
external parties underscore the need for a comprehensive approach to data
governance.
 
Join this session to learn how:
 * To protect high quality data throughout its lifecycle while reducing risks
 * Data lineage will play a key role in data governance strategies
 * CISOs can establish a secure, modern governance framework

 

Ronald Arden, Executive Vice President, CTO & COO, Fasoo, Inc.

4:00 pm - 4:25 pm et


ANTHONY SCAROLA

SVP; Director of IT Governance, Risk & Compliance, Apple Bank


CARLOS SUAREZ

Deputy Information Security Officer, Helaba


PROTECTING DIGITAL IDENTITY: COMBATTING ACCOUNT TAKEOVERS IN FINANCIAL SERVICES

Online self-service tools have empowered customers, with the majority of
transactions occurring online…

However, this convenience brings significant risks. Account takeovers have
become a prevalent threat, targeting online banking, alternative payment
platforms, and messaging apps with payment components. Each new account
introduces potential vulnerabilities, allowing attackers access to extensive
personal and financial information.

This session will delve into the mechanics of account takeovers, highlighting
how attackers pose as legitimate users to gain prolonged, undetected access to
accounts. It will explore:

 * Methods employed by cybercriminals, such as brute force attacks, phishing,
   and malware.
 * The importance of implementing MFA and robust identity and access management
   frameworks to protect private data.
 * The broader implications of account takeovers beyond individual consumers,
   including risks to supply chains and vendors.
 * Preventing illegitimate access to cloud applications and ensuring continuous
   authentication and authorization of all users and devices.

Anthony Scarola, SVP; Director of IT Governance, Risk Compliance, Apple Bank
Carlos Suarez, Deputy Information Security Officer, Helaba
4:25 pm - 4:50 pm et


VLAD BRODSKY

SVP, Chief Information Officer, OTC Markets Group


ALI KHAN

CISO, Better.com


FINANCIAL FORTIFICATION: THE POWER OF INTERDISCIPLINARY RISK MANAGEMENT

In this session, we spotlight the critical synergies between various risk
functions within financial services, particularly emphasizing the
interconnectedness of fraud, cyber, and technology risks.

The panel will focus on the importance of establishing a common language across
different risk domains and explore how fostering interdisciplinary communication
and understanding is crucial for timely and effective threat response, aligning
different departments under a unified risk management objective.

Discussion Highlights:

 * Collaborative Frameworks: Examine how CISOs and IT teams in financial
   services can seamlessly integrate security measures with everyday IT
   operations.
 * Success Stories: Highlight case studies from the financial sector that
   showcase the benefits of partnerships between risk functions, emphasizing
   efficient risk mitigation and the development of a robust cybersecurity
   culture.
 * Shared Language and Interdisciplinary Teams: Offer insights on establishing a
   common language for risk communication, forming interdisciplinary teams, and
   the importance of vigilant monitoring and rapid response systems in financial
   institutions.
 * Championing Security Investments: Discuss the critical role of CISOs in
   advocating for security investments and the necessity of executive support to
   foster an organizational environment that prioritizes cybersecurity awareness
   in financial services.

Vlad Brodsky, SVP, Chief Information Security Officer, OTC

Markets Group

 

Ali Khan, CISO, Better.com


CLOSING COMMENTS

4:50 pm - 5:00 pm et




DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT

Linkedin X-twitter

@ ISMG_News    #ISMGSummits

Register


SPONSORS









THE SUMMIT EXPERIENCE

Previous
Next
Previous
Next


CPE CREDITS

ISMG Summits offers Continuing Education Credits. Learn informative and engaging
content created specifically for security professionals.


Claim Credits


Upcoming ISMG Events


NOVEMBER 7, 2024

Cybersecurity Summit NY: Financial Services Hosted by BankInfoSecurity
See Event


NOVEMBER 7, 2024

Elevating SecOps Excellence with AI and Automation
See Event


NOVEMBER 14, 2024

Transformez vos Opérations avec l'IA Générative Avancée d'Elastic et Google
Cloud Paris
See Event


DECEMBER 5, 2024

Virtual IoT/OT Summit
See Event


FEBRUARY 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI
See Event

Upcoming ISMG Events


NOVEMBER 7, 2024

Cybersecurity Summit NY: Financial Services Hosted by BankInfoSecurity
See Event


NOVEMBER 7, 2024

Elevating SecOps Excellence with AI and Automation
See Event


NOVEMBER 14, 2024

Transformez vos Opérations avec l'IA Générative Avancée d'Elastic et Google
Cloud Paris
See Event



EVENT

 * Summits
 * Roundtables
 * Custom Events

 * Summits
 * Roundtables
 * Custom Events


ABOUT

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy




SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS

Send

@ISMG_News