ismg.events
Open in
urlscan Pro
141.193.213.10
Public Scan
Submitted URL: https://links.ismgcorp.com/MDUxLVpYSS0yMzcAAAGWh-7gEVFgBkcLCwdNVz2mxZzh0_P0HpHzBYyMJk-VB-dfnmCXoGQGVCrDMp0NocIDKRMBf_E=
Effective URL: https://ismg.events/summit/financial-service-2024/?utm_source=Marketo&utm_medium=FullAgenda_HTML&utm_campaign=Engage...
Submission: On November 04 via api from IN — Scanned from DE
Effective URL: https://ismg.events/summit/financial-service-2024/?utm_source=Marketo&utm_medium=FullAgenda_HTML&utm_campaign=Engage...
Submission: On November 04 via api from IN — Scanned from DE
Form analysis
1 forms found in the DOMName: Subscribe-Footer — POST
<form class="elementor-form" method="post" name="Subscribe-Footer">
<input type="hidden" name="post_id" value="5731">
<input type="hidden" name="form_id" value="21b9e35">
<input type="hidden" name="referer_title" value="Cybersecurity Summit: Financial Services New York">
<input type="hidden" name="queried_id" value="21427">
<div class="elementor-form-fields-wrapper elementor-labels-above">
<div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-75 elementor-field-required">
<input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-xs elementor-field-textual" placeholder="Email" required="required" aria-required="true">
</div>
<div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
<div class="elementor-field" id="form-field-field_4cf4815">
<div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
<div class="grecaptcha-badge" data-style="bottomright"
style="width: 256px; height: 60px; display: block; transition: right 0.3s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
<div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-e274fpngdxm" frameborder="0" scrolling="no"
sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
src="https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&hl=de&type=v3&v=-ZG7BC9TxCVEbzIO2m429usb&size=invisible&badge=bottomright&sa=Form&cb=3dk6lpbty5aq"></iframe>
</div>
<div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
</div><iframe style="display: none;"></iframe>
</div>
</div>
</div>
<div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-30 e-form__buttons elementor-sm-33">
<button class="elementor-button elementor-size-sm" type="submit">
<span class="elementor-button-content-wrapper">
<span class="elementor-button-text">Send</span>
</span>
</button>
</div>
</div>
</form>
Text Content
Skip to content * Events * Summits * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About Menu * Events * Summits * Roundtables * Custom Events * Sponsorship * Faculty * Contact Us * About NOVEMBER 7, 2024 CYBERSECURITY SUMMIT NY: FINANCIAL SERVICES HOSTED BY BANKINFOSECURITY 8:30 AM ET - 5:00 PM ET Register Now View Agenda Overview Topics Agenda Speakers CPE Credits Register Overview Topics Agenda Speakers CPE Credits Register EVENT OVERVIEW ISMG’s 2024 Financial Services Cybersecurity Summit will address the most pressing cybersecurity challenges facing the financial sector. The keynote panel will feature CISOs from leading firms reflecting on how the responsibilities of InfoSec leaders have expanded to encompass not only IT infrastructure but also the security of enterprise-wide data, communications, and operations. This conversation will emphasize the growing strategic importance of cybersecurity across all organizational levels..... Across a full day of engaging sessions, our esteemed speakers will offer deep insights into advanced threat intelligence, payment fraud prevention, the transformative impact of AI for threat actors and defenders alike, and how to leverage cyber insurance as a critical component of risk management. Attendees will gain practical, actionable knowledge to strengthen their defenses against emerging cyber threats. The event will culminate in our highly interactive Solution Room workshop, an interactive incident response session where participants will be thrust into a high-stakes deep fake incident scenario, allowing them to apply key strategies and tools in real-time to enhance their organizations’ crisis planning and incident response frameworks. View our ISMG Event Experience video to see what your peers are saying about their participation. Download our Summit Brochure VENUE NEW YORK MARRIOTT DOWNTOWN 85 West Street at Albany Street New York, NY 10006 NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity. HIGHLIGHT TOPICS * Critical Infrastructure * Incidence Response * Supply Chain Threats and Response * Cyber Attacks * Zero Trust Register DAVID ANDERSON Vice President, Cyber, Woodruff Sawyer VLAD BRODSKY SVP, Chief Information Officer, OTC Markets Group ANTHONY SCAROLA SVP; Director of IT Governance, Risk & Compliance, Apple Bank ERIKA DEAN CSO, Robinhood ALI KHAN CISO, Better.com MICHAEL WOODSON Information Security and Privacy Director, Sonesta Hotels KEVIN LI CISO, Cohen & Steers CARLOS SUAREZ Deputy Information Security Officer, Helaba MATANDA DOSS Executive Director - Cybersecurity and Technology Controls, JPMorgan ERIC BOATENG CISO, MassMutual BORIS KLYUCHNIKOV Special Agent, Cyber Crime Task Force, FBI SETH ROSE Supervisory Special Agent Group 06, U.S. Department of the Treasury/Cyber Investigations Unit SPEAKERS THOUGHT LEADERS ON STAGE AND LEADING THE CRITICAL CONVERSATIONS ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats View Faculty AGENDA You can now view or download a PDF version of the attendee guide. Download Agenda REGISTRATION AND BREAKFAST 7:30 AM - 8:30 AM ET OPENING REMARKS 8:30 am - 8:40 am et 8:40 AM - 9:10 AM ET ERIKA DEAN CSO, Robinhood Markets ERIC BOAENG CISO, MassMutual THE SHIFTING RESPONSIBILITIES OF INFOSEC LEADERS ACROSS FINANCIAL SERVICES Across financial services, having a robust cybersecurity posture demands moving beyond the traditional IT scope, and ensuring the security of client and enterprise communications and data across every sector of the organization. Although all employees share the responsibility for cybersecurity, Chief Information Security Officers, Chief Risk Officers, and other senior security leaders are at the forefront, confronting cyber threats directly. Simply put, these essential responsibilities can no longer be regarded as back-office functions; these roles have gained strategic importance due to the growing sophistication of cybercriminals, their advanced tools, and the significant financial implications at stake. Key Discussion Points: * Strengthening Multifactor Authentication: Proactively implement robust authentication methods to prevent high-risk data breaches. * Mitigating API Security Risks: Integrate real-time monitoring and threat detection to secure APIs against emerging vulnerabilities. * Enhancing Cloud Security Protocols: Identify and address gaps in SaaS deployments to ensure comprehensive cloud protection. * Managing Vendor Risks Proactively: Develop and enforce stringent risk management frameworks for third- and fourth-party vendors to minimize exposure. Erika Dean, CSO, Robinhood Markets Eric Boateng, CISO, MassMutual 9:10 AM - 9:40 AM ET JOANNA HUISMAN SVP Strategic Insights & Research, KnowBe4 2024 PHISHING ATTACK LANDSCAPE & BENCHMARK Our 2024 Phishing by Industry Benchmarking study analyzed a data set of 11.9 million users across 55,675 organizations with over 54.1 million simulated phishing security tests. This report highlights employee vulnerability by industry, revealing at-risk users that are susceptible to phishing/social engineering attacks. You will learn: * Phishing benchmark data for 19 industries and 7 geographical regions * Understanding who’s at risk/what you can do * Actionable tips to create your human firewall Joanna Huisman, SVP Strategic Insights & Research, KnowBe4 9:40 AM - 10:10 AM ET CHARLIE LEONARD Principal SecOps Transformation Advisor, Palo Alto Networks CHRIS HOLDEN CISO, Crum & Forster ERIKA DEAN CSO, Robinhood Markets SECOPS TRANSFORMATION - CYBERSECURITY AT SCALE For over a decade, security leaders and architects utilized a disparate best of breed point solution framework to solve their security challenges. This resulted in bloated security architectures, overlap in capabilities and significant security architecture and integration failures. These failures impacted organization’s ability to scale to meet business demands and reduced stability of the security architecture as environments and data volumes grew. The use of AI driven detections, automation, endpoint security, attack surface management and real-time threat intelligence application were the moonshot achievements for security solutions like SIEM, but were never achieved. Join this session to discuss: * Scaling to meet business demands and stabilizing your security architecture * Reimagining organizational security operations programs based on standardization * Achieving the impossible with security information and event management Charlie Leonard, Principal SecOps Transformation Advisor, Palo Alto Networks Chris Holden, CISO, Crum & Forster Erika Dean, CSO, Robinhood Markets 10:10 am - 10:40 am et PERRAJU NADAKUDUTY Director & Distinguished Engineer, Capital One SECURING WORKFORCE IDENTITIES WITH MODERN FIDO AUTHENTICATION Securing workforce identities is vital, but yesterday’s technologies are no match for tomorrow’s cyber threats. The FIDO authentication open standard offers the most modern defense tactic that organizations can leverage to create digital barriers against evolving threats. Learn how to raise the bar for security and innovation by driving phishing-resistant and passwordless authentication and cultivate phishing-resistant users across the enterprise. Perraju Nadakuduty, Director & Distinguished Engineer, Capital One NETWORKING AND EXHIBITION BREAK 10:40 am - 11:05 am et 11:05 am - 11:35 am et Track A DAVID ANDERSON Vice President, Cyber, Woodruff Sawyer UNDER THE CYBER HOOD: EXPLORING INSURANCE MYTHS AND REALITIES In this compelling discussion, top industry leaders will unravel the complexities of cyber insurance in an era of diversified and expanding risk. Panelists will provide a roadmap for CISOs to fully leverage cyber insurance, safeguarding their security while clarifying its scope and debunking common misconceptions about its effectiveness and sustainability. The discussion will explore key factors that insurers consider during the underwriting process, illustrating how companies can align their cyber insurance strategy with broader risk management objectives. Special attention will be paid to the strategic benefits of pre-breach services such as risk assessments and vulnerability scans, and post-breach services like incident response and claims support, which are pivotal in minimizing the impact of security incidents. Key Takeaways: * Comprehensive Risk Management: Learn how to utilize cyber insurance as a tool for comprehensive risk management by integrating both pre-breach and post-breach services to enhance your cybersecurity posture. * Underwriting Insights for CISOs: Gain deep insights into the underwriting process, focusing on what insurers assess to help CISOs better prepare their organizations for favorable coverage. * Navigating Market and Regulatory Changes: Explore how shifts in the cyber insurance market and regulatory landscape affect policy offerings and coverage strategies, empowering CISOs to make informed decisions. * Optimization of Insurance Procurement: Discover strategies to streamline the cyber insurance acquisition process, improving how your organization approaches risk transfer and coverage optimization. David Anderson, Vice President, Cyber, Woodruff Sawyer Track B AARON SIMPSON Partner, Hunton & Williams SETH ROSE Supervisory Special Agent Group 06, U.S. Department of the Treasury Cyber Investigations Unit MICHAEL WOODSON Information Security and Privacy Director, Sonesta Hotels NEW AGE OF PAYMENT FRAUD: HACKERS VS. HEROES Across industries, the payment ecosystem faces unprecedented challenges from increasingly sophisticated fraudsters. This session provides a comprehensive exploration of the evolving landscape of payment fraud, shedding light on the latest threats, detection strategies, and proactive measures to safeguard financial transactions. Join us as we delve into payment fraud prevention, examining rising threats such as account takeovers and synthetic identity fraud. Our expert panel will explore critical topics, including authentication techniques, data security practices, and adherence to regulatory standards. Additionally, we will address the growing risks associated with social engineering and the specific challenges faced in securing mobile payments. Key topics include: * The Evolving Face of Payment Fraud: Unpacking New Trends and Their Industry Impact * Uncovering Weaknesses in Digital Payments: Lessons from Real-World Exploits * Harnessing AI for Fraud Prevention: The Transformative Role of Machine Learning * Mastering the Maze of International Fraud: Tackling Cross-Border Payment Challenges Aaron Simpson, Partner, Hunton & Williams Seth Rose, Supervisory Special Agent Group 06, U.S. Department of the Treasury Cyber Investigations Unit Michael Woodson, Information Security and Privacy Director, Sonesta Hotels 11:40 am - 11:50 am et STEVE JACKSON VP Sales East, Entro Security RECLAIM CONTROL OVER YOUR NON-HUMAN IDENTITIES Organizations large and small grapple with the challenge of the overgrowing number of machine application identities as their cloud-native stack expands. R&D teams create and scatter non-Human identities and secrets across vaults, codes, collaboration solutions, and more without any oversight or control by security teams. Non- Human Identity breaches are among the top two attack vectors, and they are the most destructive. What solution is needed to enable organizations to securely utilize non-human identities and secrets? How can you detect, safeguard, and provide context for NHI’s & secrets stored across vaults, source code, collaboration tools, cloud environments, and SaaS platforms? Introducing Entro – the complete platform for non-human identity & Secrets management. With Entro, Security teams can finally efficiently oversee and protect non-human identities with automated lifecycle processes and seamless integration, ensuring comprehensive security and compliance through a unified interface. Steve Johnson, VP Sales East, Entro Security 11:50 am - 12:20 pm et ED THOMAS SVP, ProcessUnity BEST PRACTICES FOR THREAT AND VULNERABILITY RESPONSE & EMERGENCY ASSESSMENTS It's not getting any easier. Every time we turn around there seems to be another attack or threat that demands our attention. While each event is unique, they all result in third-party risk management teams scrambling to ensure their organizations are protected. Rapid responses and emergency assessments can be knee-jerk, stressful and distracting. It doesn’t have to be that way. Join us for a discussion on the best practices to responding to zero-day vulnerability attacks and conducting emergency assessments. We’ll outline what’s required to prepare in advance so you’re ready to execute when the time comes. From establishing solid communication channels to leveraging automation, we’ll cover the necessary steps and considerations for an effective response plan. Session attendees will learn: * How to gain visibility into your entire vendor ecosystem and prepare in advance to reduce both reaction time and exposure to loss * How to quickly identify which third parties require follow-on action based on each specific threat actor or vulnerability * How quick-assess campaigns can automatically scope, distribute, and score responses Ed Thomas, SVP, ProcessUnity 12:20 pm - 12:30 pm et DARRYL JONES VP of Product and Strategy, Ping Identity WHAT'S NEXT IN CUSTOMER IDENTITY - REDUCING FRAUD WHILE IMPROVING EXPERIENCES In an increasingly digital world, the need for robust customer identity systems has never been more critical. This, “What’s Next in Customer Identity: Reducing Fraud While Improving Experiences,” explores innovative strategies and technologies aimed at enhancing security without compromising user experience. We will delve into the latest advancements in identity verification, such as biometrics and AI-driven analytics, and discuss the balance between rigorous fraud prevention measures and seamless customer journeys. By understanding emerging trends and best practices, businesses can transform their approach to customer identity, fostering trust, enhancing loyalty, and ultimately driving growth in a competitive landscape. Join us as we envision the future of customer identity management where safety and satisfaction go hand in hand. Darryl Jones, VP of Product and Strategy, Ping Identity 12:30 pm - 12:40 pm et BILL SOVAK VP of Data Protection Sales, Fortra ETHICAL WALLS WITHIN THE FINTECH COMMUNITY Between PII, loan information, investment portfolios, and transactional data, the financial services sector has no shortage of sensitive data. For many businesses – investment banks, consulting firms, and countless fintech companies – ethical walls are needed to form a barrier between departments to block the exchange of this information. While this can be done for privacy reasons, it’s also imperative to prevent conflicts of interest and to comply with regulatory mechanisms. While new technologies like Data Security Posture Management (DSPM) can be helpful for providing visibility into where sensitive data resides, relying on a robust suite of solutions designed to safeguard data can ensure it isn’t shared between different lines of business, like retail companies and commercial banking. In this chat, learn how Fortra’s Digital Guardian, Data Classification, and Terranova Security can work in tandem to help organizations avoid data breaches and secure sensitive data while complying with any information barriers that may be in place. Bill Sovak, VP of Data Protection Sales, Fortra 12:40 pm - 12:50 pm et VINCENT STOFFER Field CTO, Corelight, Inc EXPANDING HORIZONS: LEVERAGING NETWORK SECURITY DATA FOR FRAUD DETECTION BEYOND THE SOC Network data is critical for detection, response, and forensics for security teams but there are use cases that stretch into the world of fraud. Hear some anecdotes about how passively collected network data was harnessed to alert security and fraud teams to anomalous behavior seen on application traffic. See how Corelight’s data driven approach to NDR goes beyond the SOC and into the most critical troves of data in the industry. Vincent Stoffer, Field CTO, Corelight, Inc LUNCH 12:50 pm - 1:35 pm et 1:35 pm - 1:45 pm et CURTIS REYNOLDS Senior Systems Engineer, NetWitness DEFENSE ACCELERATED: HOW NETWITNESS IS REVOLUTIONIZING THREAT DETECTION, INVESTIGATION AND RESPONSE In today’s complex and ever-changing cybersecurity landscape, you need a centralized platform to help analysts detect, investigate, and respond to known and unknown attacks fast to mitigate the financial and reputational damage that cyberattacks can cause. Join us as we take you through a live demo to showcase how you can obtain: * Unsurpassed visibility by collecting data across all capture points (user, endpoint, edge, core, cloud) and threat intelligence sources to expose the full scope of attacks. * Faster threat detection and investigation by enriching network and endpoint data at capture time with threat intelligence and business context. * Smarter, faster analytics by providing behavioral analytics (UEBA) and automation and orchestration capabilities so analysts can follow consistent, transparent, documented processes for threat hunting and investigation. Curtis Reynolds, Senior Systems Engineer, NetWitness 1:45 pm - 1:55 pm et ERIK GASTON Vice President, Global Executive Engagement, Tanium AI: MANAGING EXCITEMENT & RISK | BALANCING INNOVATION, SPEED, SECURITY, AND SHADOW AI IN FINANCIAL SERVICES In today’s fast-paced financial service industry, AI adoption is transforming how we operate, bringing both innovation and risk. As departments implement AI solutions without governance Shadow AI emerges. In this talk, we’ll explore the challenges of Shadow AI , the balance between speed and security, and the remotion responses individuals and organization face when navigating technological change. Join us to discover strategies for combatting Shadow Ai while driving innovation and learn how industry standards and future AI advancements will shape the next phase of adoption. Erik Gaston, Vice President, Global Executive Engagement, Tanium 1:55 pm - 2:05 pm et ORIEL VATURI CEO, Ovalix Security FROM STRATEGY TO EXECUTION: GAPS BETWEEN TEAMS, TOOLS, AND PROCESSES Misalignments between teams, tools, and processes drag organizations into financial, security, and efficiency losses. Unaddressed misalignments mean inconsistent processes, ineffective teams, and underutilized tools, leading to widespread inefficiencies, governance gaps, and increased risks of security breaches. Without clear and unified control over these elements, organizations incur these hidden costs every day. Introducing Ovalix: a unified platform for complete visibility and control over your security landscape. Ovalix bridges the gap between your teams, tools, and processes and ensures every aspect of your security strategy is optimized, helping you reduce risks, close governance gaps, and improve overall efficiency. Oriel Vaturi, CEO, Ovalix Security 2:05 pm - 3:05 pm et BORIS KLYUCHNIKOV Special Agent, Cyber Crime Task Force, FBI SETH ROSE Supervisory Special Agent Group 06, U.S. Department of the Treasury Cyber Investigations Unit RYAN ROOBIAN Global Solutions Architect, Google Cloud Security DEEP FAKES, REAL STAKES: UNMASKING CYBER DECEPTION IN A HIGH-STAKES TABLETOP SIMULATION Join us for this collaborative tabletop exercise, hosted by CyberEdBoard Google Cloud. This interactive session is meticulously crafted to mimic a sophisticated cyber attack. It aims to bolster strategic response capabilities and enhance operational readiness against the backdrop of advanced cyber threats. The focal point of this exercise is a strategically crafted deep fake incident targeting a corporate executive, weaving together elements of social engineering, financial fraud, and the challenges posed by emerging technological threats. What You Will Gain From This Experience: * Enhanced Organizational Readiness: To critically assess and improve organizational preparedness in responding to intricate cyber incidents involving deep fake technology and social engineering. * Interagency Collaboration and Knowledge Exchange: To strengthen the partnership and information sharing between the sponsor and leaders in the private sector cybersecurity community. * Strategic Response Development: To create all-encompassing incident response strategies that cover legal, technical, and communicational facets, while also identifying and rectifying weaknesses in existing cybersecurity policies and governance. Boris Klyuchnikov, Special Agent, Cyber Crime Task Force, FBI Seth Rose, Supervisory Special Agent Group 06, U.S. Department of the Treasury Cyber Investigations Unit Ryan Roobian, Global Solutions Architect, Google Cloud Security EXHIBITION & NETWORKING BREAK 3:05 pm - 3:30 pm et 3:30 pm - 4:00 pm et RONALD ARDEN Executive Vice President, CTO and COO, Fasoo, Inc DATA SECURITY AND PRIVACY CHALLENGES IN THE AI ERA The challenges to protect sensitive data and meet increasingly stringent privacy laws and regulations is a daunting endeavor for financial institutions. The dramatic increase in the use of LLMs and Generative AI has only complicated matters. Significant risks from insider threats, both malicious and unintentional, and external parties underscore the need for a comprehensive approach to data governance. Join this session to learn how: * To protect high quality data throughout its lifecycle while reducing risks * Data lineage will play a key role in data governance strategies * CISOs can establish a secure, modern governance framework Ronald Arden, Executive Vice President, CTO & COO, Fasoo, Inc. 4:00 pm - 4:25 pm et ANTHONY SCAROLA SVP; Director of IT Governance, Risk & Compliance, Apple Bank CARLOS SUAREZ Deputy Information Security Officer, Helaba PROTECTING DIGITAL IDENTITY: COMBATTING ACCOUNT TAKEOVERS IN FINANCIAL SERVICES Online self-service tools have empowered customers, with the majority of transactions occurring online… However, this convenience brings significant risks. Account takeovers have become a prevalent threat, targeting online banking, alternative payment platforms, and messaging apps with payment components. Each new account introduces potential vulnerabilities, allowing attackers access to extensive personal and financial information. This session will delve into the mechanics of account takeovers, highlighting how attackers pose as legitimate users to gain prolonged, undetected access to accounts. It will explore: * Methods employed by cybercriminals, such as brute force attacks, phishing, and malware. * The importance of implementing MFA and robust identity and access management frameworks to protect private data. * The broader implications of account takeovers beyond individual consumers, including risks to supply chains and vendors. * Preventing illegitimate access to cloud applications and ensuring continuous authentication and authorization of all users and devices. Anthony Scarola, SVP; Director of IT Governance, Risk Compliance, Apple Bank Carlos Suarez, Deputy Information Security Officer, Helaba 4:25 pm - 4:50 pm et VLAD BRODSKY SVP, Chief Information Officer, OTC Markets Group ALI KHAN CISO, Better.com FINANCIAL FORTIFICATION: THE POWER OF INTERDISCIPLINARY RISK MANAGEMENT In this session, we spotlight the critical synergies between various risk functions within financial services, particularly emphasizing the interconnectedness of fraud, cyber, and technology risks. The panel will focus on the importance of establishing a common language across different risk domains and explore how fostering interdisciplinary communication and understanding is crucial for timely and effective threat response, aligning different departments under a unified risk management objective. Discussion Highlights: * Collaborative Frameworks: Examine how CISOs and IT teams in financial services can seamlessly integrate security measures with everyday IT operations. * Success Stories: Highlight case studies from the financial sector that showcase the benefits of partnerships between risk functions, emphasizing efficient risk mitigation and the development of a robust cybersecurity culture. * Shared Language and Interdisciplinary Teams: Offer insights on establishing a common language for risk communication, forming interdisciplinary teams, and the importance of vigilant monitoring and rapid response systems in financial institutions. * Championing Security Investments: Discuss the critical role of CISOs in advocating for security investments and the necessity of executive support to foster an organizational environment that prioritizes cybersecurity awareness in financial services. Vlad Brodsky, SVP, Chief Information Security Officer, OTC Markets Group Ali Khan, CISO, Better.com CLOSING COMMENTS 4:50 pm - 5:00 pm et DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT Linkedin X-twitter @ ISMG_News #ISMGSummits Register SPONSORS THE SUMMIT EXPERIENCE Previous Next Previous Next CPE CREDITS ISMG Summits offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals. Claim Credits Upcoming ISMG Events NOVEMBER 7, 2024 Cybersecurity Summit NY: Financial Services Hosted by BankInfoSecurity See Event NOVEMBER 7, 2024 Elevating SecOps Excellence with AI and Automation See Event NOVEMBER 14, 2024 Transformez vos Opérations avec l'IA Générative Avancée d'Elastic et Google Cloud Paris See Event DECEMBER 5, 2024 Virtual IoT/OT Summit See Event FEBRUARY 11-12, 2025 Virtual Summit: Cybersecurity Implications of AI See Event Upcoming ISMG Events NOVEMBER 7, 2024 Cybersecurity Summit NY: Financial Services Hosted by BankInfoSecurity See Event NOVEMBER 7, 2024 Elevating SecOps Excellence with AI and Automation See Event NOVEMBER 14, 2024 Transformez vos Opérations avec l'IA Générative Avancée d'Elastic et Google Cloud Paris See Event EVENT * Summits * Roundtables * Custom Events * Summits * Roundtables * Custom Events ABOUT * Sponsorship * Leadership * Company * Privacy Policy * Sponsorship * Leadership * Company * Privacy Policy SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS Send @ISMG_News