ismg.events
Open in
urlscan Pro
151.101.2.159
Public Scan
URL:
https://ismg.events/summit/fraud-security-risk-newyork-2024/
Submission: On April 23 via manual from US — Scanned from DE
Submission: On April 23 via manual from US — Scanned from DE
Form analysis
1 forms found in the DOMName: New Form — POST
<form class="elementor-form" method="post" name="New Form">
<input type="hidden" name="post_id" value="5731">
<input type="hidden" name="form_id" value="21b9e35">
<input type="hidden" name="referer_title" value="Fraud, Security & Risk Management Summit: New York">
<input type="hidden" name="queried_id" value="14878">
<div class="elementor-form-fields-wrapper elementor-labels-above">
<div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required">
<input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-sm elementor-field-textual" placeholder="Email" required="required" aria-required="true">
</div>
<div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
<div class="elementor-field" id="form-field-field_4cf4815">
<div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-bydv9wi9hh3e" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&hl=de&type=v3&v=QoukH5jSO3sKFzVEA7Vc8VgC&size=invisible&badge=bottomright&sa=Form&cb=jlrux6pwwu72"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</div>
</div>
<div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons">
<button type="submit" class="elementor-button elementor-size-sm">
<span>
<span class=" elementor-button-icon">
</span>
<span class="elementor-button-text">Send</span>
</span>
</button>
</div>
</div>
</form>
Text Content
Skip to content * Events * Summits * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About Menu * Events * Summits * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About APRIL 25TH, 2024 FRAUD, SECURITY & RISK MANAGEMENT SUMMIT: NEW YORK Register Now Overview Topics Agenda Speakers CPE Credits Register Overview Topics Agenda Speakers CPE Credits Register EVENT OVERVIEW The ISMG Fraud, Security & Risk Management Summit dedicates a full day to advancing cybersecurity education among leaders and delivering enlightening sessions that encompass a diverse range of essential subjects. Among the highlights will be a comprehensive exploration of incident response strategies during the hands-on and engaging “solution room” exercise. This activity tests the abilities of CISOs and cybersecurity leaders as they devise response strategies for a worldwide cybersecurity incident. Join us for an in-depth look at pressing topics such as the technical landscape of AI, budget management, the shifting culture in cybersecurity, and more. As cybersecurity leaders strive to maintain equilibrium in a rapidly evolving landscape, the summit offers guidance on finding balance in times of change, reinforcing the notion that a steady hand at the helm is vital in safeguarding digital landscapes. View our ISMG Event Experience video to see what your peers are saying about their participation. Download Summit Brochure VENUE ETC MADISON AVE 360 Madison Ave, New York, NY 10017 HIGHLIGHT TOPICS * Data Science’s Role in Cyber Threat Forecasting * Proactive Security Posture * Adapting to Enhanced SEC Scrutiny * Third-Party Risk Management And much more! Register ADVISORS THOUGHT LEADERS LEADING DEEP-DIVE DISCUSSIONS ON STAGE ISMG Summits bring the foremost thought leaders and educators in the security space on stage, at interactive workshops and networking events. Learn from the who’s who in the cybersecurity industry, passionate about the latest tools and technology to defend against threats. MURLI NAMBIAR CISO, SBI ATANU ROY Group CIO, Biocon Group SACHIN SETH CEO and MD, BSE Ebix Insurance Broking (BSE Ebix) JOHN FRUSHOUR Vice President and Chief Information Security Officer, New York-Presbyterian Hospital CLAIRE LE GAL SVP, Fraud Intelligence, Strategy & Cyber Products, Mastercard MICHAEL GIOIA CISO, Babson College KAREN BOYER SVP Financial Crimes, M&T Bank FRED HARRIS Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi BRENNAN LODGE Head of Analytic Engines Cybersecurity, HSBC JAGATHI GADE Global Head of Risk Engineering, Square DAVID ANDERSON Vice President of Cyber, Woodruff Sawyer ANDRES ANDREU Deputy CISO, Hearst KEVIN COOKE Senior Special Agent, United States Secret Service LAURA DEANER CISO, Northwestern Mutual UMESH YERRAM Global CISO, Cboe Global Markets CHRIS HOLDEN CISO, Crum & Forster BRENNAN LODGE Professor, Information Technology & Data Analytics, New York University LA MONTE YARBOROUGH CISO, Acting Deputy CIO, HHS WALKER NEWELL Vice President, Securities Litigation and Enforcement, Woodruff Sawyer FRED HARRIS Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi DAVID SHEIDLOWER Vice President, Chief Information Security & Privacy Officer, Turner Construction Company SPEAKERS THOUGHT LEADERS LEADING DEEP-DIVE DISCUSSIONS ON STAGE ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in cybersecurity passionate about the latest tools and technology to defend against threats View Faculty AGENDA You can now view or download a PDF version of the attendee guide. Download Agenda REGISTRATION & BREAKFAST 8:00 am et - 8:30 am et 8:30 am – 9:00 aM ET LA MONTE YARBOROUGH CISO, Acting Deputy CIO, HHS LAURA DEANER CISO, Northwestern Mutual PRESTON MILLER Director, Unit 42 by Palo Alto Networks THREAT INTELLIGENCE: PROACTIVE SECURITY POSTURE AGAINST EVOLVING ADVERSARIES An interconnected and automated world creates new opportunities for security practitioners and fraudsters alike. To effectively mitigate and respond to attacks, organizations must understand the latest capabilities and threats being deployed by their adversaries. This session will equip CISOs with the latest analysis on the global threat landscape, the ways in which bad actors are leveraging emerging technologies to exploit traditional weaknesses, and bold strategies for combatting new and evolving threats. Key takeaways will include: * Integrating new threat intelligence protectively into a robust risk management framework. * Analyzing the rise in zero-day attacks and the blind spots they exploit. * Understanding how AI/ML capabilities are being leveraged by adversaries for future attacks and how they can be leveraged to neutralize them. * Considering the role of behavioral analytics in enhancing threat detection capabilities. La Monte Yarborough, CISO, Acting Deputy CIO, HHS Laura Deaner, CISO, Northwestern Mutual Preston Miller, Director, Unit 42 by Palo Alto Networks 9:00 am – 9:30 aM ET CHRIS WYSOPAL CTO & Co-Founder, Veracode THE CROSSROADS OF AI AND APPLICATION SECURITY The potential of artificial intelligence is vast, with many industries already harnessing its capabilities. In application security, AI has made some significant improvements - including finding flaws faster, suggesting fixes, and the ability to rewrite code - and more are likely to come Although, as with any new technology, it brings its own risks, including incorrect code suggestions and more intelligent malware attacks. Join this session to explore how to harness AI tools to work for you while ensuring your organization stays secure. Chris Wysopal, CTO & Co-Founder, Veracode 9:30 am – 10:00 AM ET PETER TSE Information Security Officer, CTBC Bank BORIS KLYUCHNIKOV Special Agent, FBI PAYMENT FRAUD: NAVIGATING THE COMPLEXITIES OF MODERN THREATS Across industries, the payment ecosystem faces unprecedented challenges from increasingly sophisticated fraudsters. This session provides a comprehensive exploration of the evolving landscape of payment fraud, shedding light on the latest threats, detection strategies, and proactive measures to safeguard financial transactions. Join us as we delve into the cutting-edge of payment fraud prevention, examining rising threats such as account takeovers and synthetic identity fraud. Our expert panel will explore critical topics including authentication techniques, data security practices, and adherence to regulatory standards, while also addressing the growing risks associated with social engineering and the specific challenges faced in securing mobile payments. Attendees will gain a comprehensive understanding of the latest trends, vulnerabilities and strategies essential for effectively combating payment fraud as well as: * The evolving face of payment fraud: Unpacking new trends and their industry impact * Uncovering weaknesses in digital payments: Lessons from real-world exploits * Harnessing AI for fraud prevention: The transformative role of machine learning * Mastering the maze of international fraud: Tackling cross-border payment challenges Peter Tse, Information Security Officer, CTBC Bank Boris Klyuchnikov, Special Agent, FBI 10:00 am – 10:30 AM ET DAVE JOHNSON Principal Solutions Architect, Expel WHERE RISK MEETS CYBERSECURITY: A CRITICAL CONNECTION POINT Many organizations look at risk as pillars – legal, fraud, regulatory and cybersecurity. But these pillars can't be separate columns that shoulder the load. They must be interconnected. This session looks at the ways risk and security must align and integrate to avoid gaps for a more resilient organization. Dave Johnson, Principal Solutions Architect, Expel 10:30 am – 10:45 AM ET SHASHANK GOLLA Product Marketing Manager, Wiz CLOUD SECURITY MATURITY AND THE NEED FOR PROACTIVE AND REACTIVE APPROACHES Enterprises of all sizes are moving to the cloud or expanding their footprint, and cloud environments are becoming more complex. Security leaders are constantly trying to improve their overall security posture. Some primarily focus on reducing risk, and others maintain a detection-first mindset. So, what is the right approach? The answer is both. But which approach should be the focus today depends on the enterprise’s security maturity. In this session, we will discuss: * What cloud security maturity is and the path to achieving it; * Creating an effective security backstop with cloud detection and response; * How reactive security should be an enabler for proactive security. Shashank Golla, Product Marketing Manager, Wiz NETWORKING & EXHIBITION BREAK 10:45 am et - 11:15 am et 11:15 am – 11:25 am ET MATANDA DOSS Executive Director - Cybersecurity and Technology Controls, JP Morgan MICHAEL DENICOLA Supervisory Special Agent, Cyber Division, FBI KAREN BOYER SVP Financial Crimes, M&T Bank CLAIRE LE GAL SVP, Fraud Intelligence, Strategy & Cyber Products, Mastercard STEPHEN JOHNSON VP of Solutions Engineering, Entro Security SECURE THE NON-HUMAN IDENTITY NIGHTMARE Organizations large and small grapple with the challenge of the overgrowing number of machine application identities as their cloud-native stack expands. R&D teams create and scatter secrets across vaults, code, collaboration solutions and more without any oversight or control by security teams. Secret-based breaches are among the top three attack vectors, and they are the most destructive. What solution is needed to enable organizations to securely utilize non-human identities and secrets? How can you detect, safeguard, and provide context for secrets stored across vaults, source code, collaboration tools, cloud environments, and SaaS platforms? Introducing Entro – the complete platform for non-human identity & Secrets management. With Entro, Security teams can finally efficiently oversee and protect non-human identities with automated lifecycle processes and seamless integration, ensuring comprehensive security and compliance through a unified interface. Stephen Johnson, VP of Solutions Engineering, Entro Security 11:25 am – 11:55 am ET PAUL KURTZ Field CTO, Splunk WALKER NEWELL Vice President, Securities Litigation and Enforcement, Woodruff Sawyer DAVID ANDERSON Vice President of Cyber, Woodruff Sawyer SEAN MACK Former CISO, Wiley; ISMG Contributor ADAPTING TO ENHANCED SEC SCRUTINY: STRATEGIES FOR CISOS POST-SOLARWINDS In recent years, the Securities and Exchange Commission (SEC) has sued multiple public companies for supposedly lax disclosures around cybersecurity incidents — even when there was no evidence of bad intent or even negligence. This year, the SEC significantly ratcheted up the pressure on public companies – and CISOs. In July, the SEC adopted new rules giving the government more avenues to second-guess good-faith cybersecurity disclosure decisions. Then, in November, the SEC sued SolarWinds and its CISO for fraud, marking the start of a new era in cybersecurity enforcement. In this discussion, our esteemed panel will provide an inside perspective on SEC risk – and mitigation – for CISOs and other security professionals in the wake of SolarWinds ruling, including: * How the SEC approached cybersecurity cases before SolarWinds ruling, and the new rules * How SolarWinds ruling and the new rules are likely to influence future SEC enforcement activities * Lessons for CISOs from the SolarWinds ruling * How CISOs can navigate an enhanced role in the disclosure process * Key indemnification and insurance considerations Paul Kurtz, Chief Cybersecurity Advisor & Field CTO, Splunk Walker Newell, Vice President, Securities Litigation and Enforcement, Woodruff Sawyer David Anderson, Vice President of Cyber, Woodruff Sawyer Sean Mack, Former CISO, Wiley; ISMG Contributor 11:55 am – 12:25 pM ET ROBERT O'LEARY CFCE, Senior Solutions Architect, Binalyze PROACTIVE THREAT HUNTING FOR ENTERPRISE ORGANIZATIONS In this session, we'll explore the world of threat hunting and its role in fortifying security operations centers and incident response teams. Learn the latest methodologies, tools and best practices that SOC analysts and incident responders use to detect and neutralize emerging cyberthreats. Through real-world examples, you will learn how to leverage threat intelligence, conduct network and endpoint analysis, apply machine learning algorithms, and foster a collaborative security culture. Robert O’Leary, CFCE, Senior Solutions Architect, Binalyze 12:25 pm – 12:55 pM ET THERESA LANOWITZ Head Evangelism and Research, AT&T Cybersecurity BREAKING DOWN SILOS TOWARD A SECURE FUTURE Edge computing is a collaborative endeavor that requires organizations to break down silos and foster a healthy working relationship among all stakeholders. Based on new research, Theresa Lanowitz explains how these new relationships drive innovation focused on business requirements, increase resilience, and improve security. She will share the business drivers for edge use cases and explain how organizations are shifting budgets to support and secure these initiatives. Theresa Lanowitz, Head Evangelism and Research, AT&T Cybersecurity LUNCH & EXHIBITION BREAK 12:55 pm – 1:40 pM ET 1:40 pm – 2:10 pM ET FRED HARRIS Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi DAVID ANDERSON Vice President of Cyber, Woodruff Sawyer CHRIS HOLDEN VP, CISO, Crum & Forster JASON POPE VP, Sales Engineering, Rubrik THIRD-PARTY RISK MANAGEMENT: A CRITICAL COMPONENT IN THE CYBERSECURITY FRAMEWORK In an era where cyber teams in every industry increasingly depend on third-party services, ranging from customer support to cloud-based solutions and fintech innovations, it's imperative for CISOs to recalibrate their strategies for managing third-party risks. CISOs must recognize that third-party risk management is not just an add-on to the cybersecurity agenda but a central piece of the overall strategy to safeguard their organizations in the digital landscape. This discussion delves into: * The significance of implementing a solid vendor risk management framework and the potential consequences of oversight failures. * Tactical approaches for managing vendors that present a higher level of risk. * The utilization of metrics and external notifications to monitor and mitigate third-party risks effectively. Fred Harris, Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi David Anderson, Vice President of Cyber, Woodruff Sawyer Chris Holden, VP, CISO, Crum & Forster Jason Pope, VP, Sales Engineering, Rubrik 2:10 pm – 2:20 pM ET CHRISTOPHER HILLS Chief Security Strategist, BeyondTrust IDENTITY DEFENSE IN FINANCE: CONFRONTING THE EMERGING THREAT LANDSCAPE In this session, we will explore the challenges IT and cybersecurity leaders face to effectively navigate identity security risks within intricate and ever-changing environments. The discussion will touch upon key issues such as third-party vendor access, privilege elevation, vulnerability awareness, and how an identity-first security approach leads to zero trust and lower cyber insurance premiums. Attendees will learn about market trends, emerging threats and risk mitigation strategies related to identity privilege. Join us for valuable insight into the future of identity security. Christopher Hills, Chief Security Strategist, BeyondTrust 2:20 pm – 3:15 pM ET FRED HARRIS Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi DAVID ANDERSON Vice President of Cyber, Woodruff Sawyer CHRIS HOLDEN CISO, Crum & Forster KEVIN COOKE Senior Special Agent, United States Secret Service DEEPFAKES, REAL STAKES: UNMASKING CYBER DECEPTION IN A HIGH-STAKES INTERACTIVE TABLETOP SIMULATION Join us for this collaborative tabletop exercise, hosted jointly by the United States Secret Service and CyberEdBoard. This interactive session is meticulously crafted to mimic a sophisticated cyberattack. It aims to bolster strategic response capabilities and enhance operational readiness against the backdrop of advanced cyberthreats. The focal point of this exercise is a strategically crafted deepfake incident targeting a corporate executive, weaving together elements of social engineering, financial fraud, and the challenges posed by emerging technological threats. What you will gain from this experience: * Enhanced Organizational Readiness: To critically assess and improve organizational preparedness in response to intricate cyber incidents involving deepfake technology and social engineering. * Interagency Collaboration and Knowledge Exchange: To strengthen the partnership and information sharing between the Secret Service and leaders in the private sector cybersecurity community. * Strategic Response Development: To create all-encompassing incident response strategies that cover legal, technical and communicational facets, while also identifying and rectifying weaknesses in existing cybersecurity policies and governance. Kevin Cooke, Senior Special Agent, United States Secret Service Boris Klyuchnikov, Special Agent, FBI Chris Holden, CISO, Crum & Forster Fred Harris, Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi Peter Tse, Information Security Officer, CTBC Bank David Anderson, Vice President of Cyber, Woodruff Sawyer Walker Newell, Vice President, Securities Litigation and Enforcement, Woodruff Sawyer Sean Mack, Former CISO, Wiley; ISMG Contributor NETWORKING & EXHIBITION BREAK 3:15 pm – 3:40 pM ET 3:40 pm – 4:10 pM ET FRED HARRIS Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi DAVID SHEIDLOWER Vice President, Chief Information Security & Privacy Officer, Turner Construction Company JAGATHI GADE Global Head of Risk Engineering, Square ENHANCING COLLABORATIVE RISK MANAGEMENT: UNIFYING THE APPROACH TO FRAUD, CYBER AND TECH RISKS In this session, we spotlight the critical synergies between various risk functions, emphasizing the interconnectedness of fraud, cyber, and technology risks. The panel will focus on the importance of establishing a common language across different risk domains and explore how fostering interdisciplinary communication and understanding is crucial for timely and effective response to threats, aligning different departments under a unified risk management objective. In this discussion, our esteemed panel will: * Examine the collaborative frameworks that enable CISOs and IT teams to seamlessly integrate security measures with everyday IT operations. * Highlight success stories that showcase the benefits of these partnerships, emphasizing efficient risk mitigation and the development of a robust cybersecurity culture. * Offer insights on how to establish a shared language for risk communication, the formation of interdisciplinary teams, and the importance of vigilant monitoring and rapid response systems. * Discuss the critical role of CISOs in championing security investments and the necessity of executive support to foster an organizational environment that prioritizes cybersecurity awareness. Fred Harris, Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi David Sheidlower, Vice President, Chief Information Security & Privacy Officer, Turner Construction Company Jagathi Gade, Global Head of Risk Engineering, Square 4:10 pm – 4:40 pM ET BRENNAN LODGE Professor, Information Technology & Data Analytics, New York University UMESH YERRAM Global CISO, Cboe Global Markets ANDRES ANDREU Deputy CISO, Hearst INTELLIGENCE AMPLIFIED: DATA SCIENCE'S ROLE IN CYBERTHREAT FORECASTING Data science has ascended beyond the role of a mere tool; it has become a pivotal force in reshaping how organizations confront and adapt to threats. Its role in analyzing past incidents and identifying future vulnerabilities is essential across organizational silos and industries. In this exclusive session, our panel will take a deep dive into the dual significance of leveraging data science to not only fortify security posture but also to proactively enhance organizational readiness. Key areas of discussion will include: * Predictive Analytics for Security Posture: Unveiling effective methods to harness predictive analytics and thoroughly assess existing security posture. * Data Science in Threat Intelligence: Delving into how data science can process vast amounts of cyberthreat intelligence to predict and prevent attacks. * Machine Learning Algorithms for Pattern Recognition: An in-depth examination of how machine learning algorithms can assimilate knowledge from past security incidents to identify patterns and prevent future breaches. * Collaborative Data Initiatives: An exploration of the significance of data sharing across organizational boundaries, emphasizing the collective strength derived from collaborative defense efforts. * Role of Education in Cybersecurity: Shining a light on the indispensable role of education in building, upskilling and retaining adaptive, vigilant teams. Brennan Lodge, Professor, Information Technology & Data Analytics, New York University Umesh Yerram, Global CISO, Cboe Global Markets Andres Andreu, Deputy CISO, Hearst CLOSING COMMENTS 4:40 PM - 4:45 pm ET DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT #ISMGSummit @ISMG_News SPONSORS THE SUMMIT EXPERIENCE Previous Next Previous Next CPE CREDITS Our summits offer Continuing Education Credits. Learn informative and engaging content created specifically for security professionals. Claim Credits REGISTER RSVP here to attend our events. You can select for multiple or individual tickets. NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity. 2024 FRAUD, SECURITY, AND RISK SUMMIT: NEW YORK Apr 25, 2024 RSVP Available till Apr 25, 2024 (11:00 PM) Add Please enter your email to continue I agree to the Terms and Conditions and Privacy Policy. Proceed Upcoming ISMG Events APRIL 10, 2024 Strategies and Mandates for Phishing-Resistant MFA in Financial Services and Healthcare See Event APRIL 24, 2024 Securing OT/IoT in the Age of Automation and Cloud Integration See Event MAY 15, 2024 Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience See Event APRIL 16, 2024 Cybersecurity Implications of AI Summit: North America West Summit See Event JUNE 13, 2024 Cybersecurity & Business Transformation Summit: Bengaluru See Event Upcoming ISMG Events MAY 15, 2024 Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your Organization's Resilience See Event APRIL 16, 2024 Cybersecurity Implications of AI Summit: North America West Summit See Event APRIL 24, 2024 Securing OT/IoT in the Age of Automation and Cloud Integration See Event EVENT * Summits * Engage * Roundtables * Custom Events * Summits * Engage * Roundtables * Custom Events ABOUT * Sponsorship * Leadership * Company * Privacy Policy * Sponsorship * Leadership * Company * Privacy Policy @ISMG_News #ISMGEngage SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS Send