ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Breach Prevention Summit: Washington D.C.

May 16-17, 2017

Watch Past Sessions Online

Keynote Speaker

Art Coviello, Former Chair, RSA

WELCOME / Letter from the Content Director

Eric Chabrow

Executive Editor, GovInfoSecurity & InfoRiskToday; Host & Producer, ISMG Security Report

Join us in Washington D.C. and hear from industry leaders such as Art Coviello, Former Chair, RSA , Kim Peretti, Partner, Alston & Bird, Gregory Wilshusen, Director US Government Accountability Office, Ari Schwartz, Managing Director, Venable and Robert Villanueva, US Secret Service speak to cyber security challenges all practitioners face today. From IoT and the emerging use of deception technology, to the ever-persistent and ongoing business email compromise trend, DDoS for extortion and ransomware attacks, 2017 promises to have more than enough for all of us to talk about and learn from each other. We have intentionally designed our sessions to address the needs of CISOs, fraud and risk teams, security and IT professionals, and many others by providing hands-on tools and real-world problems and solutions that attendees can take back to their offices long after the summits end.

Details

Renaissance Dupont Circle

May 16th & 17th, 2017

$795

View Sessions

Registering For a Group?
Call +1 (609)-356-1499

  • Event Gallery

Gregory Wilshusen

Director, Information Security Issues, U.S. Government Accountability Office

Tom Field

SVP - Editorial, ISMG

Art Coviello

Fmr CEO, RSA Security; Venture Partner, Rally Ventures

Mark Rasch

Principal, Rasch Technology and Cyber Law; former Chief Security Evangelist, Verizon

Kim Peretti

Co-Lead, Cybersecurity Preparedness and Response practice, Alston and Bird LLP, and former DOJ Cybercrime Prosecutor

Christopher Pierson

Chief Security Officer and General Counsel, Viewpost

Ari Schwartz

Managing Director of Cybersecurity Services, Venable

Michael Daniel

President, Cyber Threat Alliance; Former Cybersecurity Coordinator and Special Assistant to the President

SPEAKERS / Featured Speakers For Our Washington, DC Summit

Art Coviello

former CEO, RSA Security; Venture Partner, Rally Ventures

Steve Chabinsky

Global Chair of Data, Privacy and Cybersecurity, White & Case

Michael Daniel

President, Cyber Threat Alliance, and Former Cybersecurity Coordinator and Special Assistant to the President

Gregory Wilshusen

Director, Information Security Issues, U.S. Government Accountability Office

Jeanette Manfra

Deputy Undersecretary of Cybersecurity (acting), U.S. Department of Homeland Security

Ari Schwartz

Managing Director for Cybersecurity Policy, Venable

Tom Kellermann

Chief Cybersecurity Officer, Carbon Black

Jeremy Grant

former Sr. Executive Advisor NIST; Managing Director, Technology Business Strategy, Venable

Kim Peretti

Co-Lead, Cybersecurity Preparedness and Response practice, Alston and Bird, and Former DOJ Cybercrime Prosecutor, Alston & Bird

Matthew Braverman

Supervisory Special Agent, Washington Field Office, FBI

Robert Villanueva

Executive Vice President, Q6 Cyber and Founder of the Cyber Threat Intelligence Division of the US Secret Service

Alex Mosher

Vice President of Security Strategy, CA Technologies

Dr. Christopher Pierson

Founder & CEO, BLACKCLOAK

John Buzzard

Fraud Subject Matter Expert, NICE Actimize

Tom Field

Senior Vice President, Editorial, ISMG

Randy Vanderhoof

Director, US Payments Forum

Richard Bortnick

Cyber Liability and Insurance Attorney, Traub Lieberman Straus & Shrewsberry, LLP

Randy Sabett

Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP

Richard Parry

Principal, Parry Advisory; former Risk Management Executive, JPMorgan Chase

Barak Feldman

National Director for the Privileged Account Security Solution Portfolio, CyberArk

Paul Bowen

Principal Security Technologist, Arbor Networks

Chip Mason

Lead, Mainframe Security Product Management, Broadcom

Roger Applewhite

Board Member, Electronic Funds Transfer Association & Secure Remote Payments Council

Mark Rasch

Principal, Rasch Technology and Cyber Law; former Chief Security Evangelist, Verizon

Brian Harrell

Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency

Sean Keef

Global Sales Enablement, Skybox

Wes Dobry

Principal Security Architect, Agari

Brian Soldato

Senior Director of Product Management, NSS Labs

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Schedule / Session Date & Times



  • Tuesday, May 16th

  • Wednesday, May 17th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:00 am -
8:45 am
8:00 am - 8:45 am

Registration, Breakfast & Exhibit Browsing

8:45 am -
9:00 am
8:45 am - 9:00 am

Opening Remarks

9:00 am -
9:45 am
9:00 am - 9:45 am

Industry and Practitioners in Crisis

Speaker:
Art Coviello, former CEO, RSA Security; Venture Partner, Rally Ventures

The biggest companies (the Fortune 500 types) are more often than not taking matters into their own hands when it comes to breach prevention, eschewing long-term relationships with vendors and charting their own courses with a dizzying array of technologies. Meanwhile, the "unfortunate" 5,000 and beyond fall further behind, struggling to find talent and budget, while security industry vendors produce evermore granular point products that leave everyone unsatisfied and exhausted. Does this sound like the prospects are good for reducing breaches and fraud? The short answer: No.

During this session, former RSA Chairman Art Coviello will review possible paths forward for practitioners, as well as what they should be looking for from vendors, service providers and their own management.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

9:50 am -
10:35 am
9:50 am - 10:35 am

Why Organizations Fail to Implement Proper Security Safeguards and What They Can Do About It

Speaker:
Gregory Wilshusen, Director, Information Security Issues, U.S. Government Accountability Office

The complexity of information technology and the constantly evolving threat landscape makes implementing appropriate controls and processes to secure information assets a major challenge for most enterprises in and out of government. The number of vulnerabilities organizations face is mindboggling: the National Institute of Standards and Technology vulnerability database tops 82,000, and that doesn't count unknown vulnerabilities.

For a dozen years, Gregory Wilshusen and his team of auditors and technical specialists at GAO, the investigative arm of Congress, have issued some 200 reports containing nearly 3,500 recommendations on U.S. federal government IT security, and have identified common problems organizations face and the reasons they often fail in securing information technology. Wilshusen identifies the common areas agencies struggle with to secure their IT and prevent breaches, including access controls, identity and authentication management, continuous monitoring, patch implementation and software testing; explain typical reasons organizations fail to take proper actions to secure their organizations' IT; and recommend solutions organization should take to mitigate this problem.

Though Wilshusen's focus is on government agencies, his findings and recommendations also apply to enterprises outside the federal government, including the private sector.

10:35 am -
10:50 am
10:35 am - 10:50 am

Exhibiting & Networking Break

10:50 am -
12:00 pm
10:50 am - 12:00 pm

Cybersecurity in the Era of Donald Trump

Speakers:
Ari Schwartz, Managing Director for Cybersecurity Policy, Venable
Christopher Krebs, Director of Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security
Jeremy Grant, former Sr. Executive Advisor NIST; Managing Director, Technology Business Strategy, Venable
Randy Sabett, Special Counsel, Cyber/Data/Privacy Practice Group, Cooley LLP
Steve Chabinsky, Global Chair of Data, Privacy and Cybersecurity, White & Case

Moderator: Eric Chabrow, Host & Producer, ISMG Security Report; Executive Editor, GovInfoSecurity & InfoRiskToday

Christopher Krebs, Special Counsel to Department of Homeland Security John Kelly, will kick off this panel discussion and set the tone about cybersecurity in the Trump era with a 10-minute overview of the cybersecurity challenges DHS is addressing

From there, the full panel will review how President Donald Trump's early initiatives on cybersecurity are shaping up. What impact will Trump's approach to IT security affect government IT, the nation's critical infrastructure and the private sector as well as the nation's long-term cybersecurity resiliency? How do they differ from the Obama administration's methods to secure IT? A panel of cybersecurity experts and policymakers from Republican and Democratic administrations will explore how the new administration's cybersecurity stance will have an impact not only your IT and security operations but your business or agency, as well.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

12:00 pm -
12:45 pm
12:00 pm - 12:45 pm

Speed Networking With Presenters and Peers

One of the most valuable ways to learn is through interaction with your peers. Our “Speed Networking” session will provide an opportunity to meet practitioners who have similar challenges in the arena of fraud and breach prevention and discuss solutions to those potential obstacles. Mingle, share and learn in this unique, rapid fire and interactive environment.

12:45 pm -
1:45 pm
12:45 pm - 1:45 pm

Lunch

1:45 pm -
2:15 pm
1:45 pm - 2:15 pm

The Impact of New York's New Cyber Regulations: Don't Let the Sunrise of Regulatory Mandates Catch You Sleeping

Speaker:
Paul Bowen, Principal Security Technologist, Arbor Networks

The pressure is on for all industries to upgrade their cyber-protection policies. New York is the first state to initiate a 180-day grace period for all financial services companies to upgrade both cyber policies and protection. As New York's new cyber mandates roll out, other states and industries will likely follow. During this session, Arbor Networks' Principal Security Technologist Paul Bowen will outline the impact of these new regulations, and provide an incident response framework that helps with compliance and preventing an inevitable compromise from turning into a breach.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

2:20 pm -
2:50 pm
2:20 pm - 2:50 pm Government Track

FBI's Take on Latest Trends in Criminal Cyberthreats: From Ransomware to BEC

Speaker:
Matthew Braverman, Supervisory Special Agent, Washington Field Office, FBI

This session will review the latest trends in ongoing and emerging cyberthreats posed by cybercriminals. FBI Supervisory Special Agent Matt Braverman will walk through the latest tactics being used in ransomware, business email compromise exploits and other cyber-extortion schemes, and discuss the FBI's stance on how organizations can and should mitigate their risks and respond.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

2:20 pm - 2:50 pm Data Breach Track

Incident Response Planning and Your Organization, v. 2.0

Speaker:
Kim Peretti, Co-Lead, Cybersecurity Preparedness and Response practice, Alston and Bird, and Former DOJ Cybercrime Prosecutor

Most sophisticated organizations have had their incident response plans in place for several years. But the landscape has changed, and incident response plans and planning that remain static are at risk of being counter-productive in today's environment. If you haven't dusted off your plan in even a couple of years, this session will provide an overview of changes in the landscape and what you need to do to be ready for them. We will discuss the evolving role of officers and directors, legal, the information security function, and risk management. We also will address the shifting perception of security incidents from the public and regulators, new laws across the globe, and how continuing evolution within the space impacts today's planning for security-related incidents.

2:55 pm -
3:25 pm
2:55 pm - 3:25 pm Government Track

PAM and Secure Code: Gaining an Inside and Outside View of Applications

Speaker:
Alex Mosher, Vice President of Security Strategy, CA Technologies

Many organizations are undergoing a transformation to support digital platforms and stay competitive; but in order to maintain security, they have to ensure that access to these platforms is limited and that security remains a priority. New vulnerabilities to cybercrime are being introduced through hybrid environments, ones that often include remote access to systems and servers, automation of processes, and concentration of administrative power. Limiting administrative power through privileged access management is increasingly critical, but so is authentication, as more legitimate users' credentials are being compromised and access to systems is being fooled by the coders. According to the 2017 Verizon Data Breach Investigations Report, today's breaches involve a "combination of human factors, hardware devices, exploited configurations or malicious software." How can these risks be mitigated while still keeping a competitive edge? This session will explore how taking a proactive stance can help mitigate risks, while still enabling the business to use tools that are necessary in today's digitally charged economy.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

2:55 pm - 3:25 pm Data Breach Track

The Rise of Cybercrime as a Service: Which Threats Should We Address First?

Speaker:
Sean Keef, Global Sales Enablement, Skybox

Monetarily motivated attacks are by far the most prevalent cyberthreats to organizations worldwide, yet vulnerability management techniques have largely failed to adapt to a threat landscape dominated by distributed crimeware. By understanding the commercialization of attack tools and services - particularly the vulnerabilities they use, re-use and share - vulnerability management can focus on the small subset of vulnerabilities that are exploited in the wild and packaged in distributed crimeware. This threat-centric approach improves vulnerability prioritization and focuses remediation on the relatively small number of exploitable vulnerabilities, greatly reducing risk through efficient, intelligent processes. This session will cover what's been driving the shift to distributed cybercrime, how to align vulnerability management with real-world threat behavior, and what intelligence and tools are needed.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

3:25 pm -
3:35 pm
3:25 pm - 3:35 pm

Exhibiting & Networking Break

3:35 pm -
4:05 pm
3:35 pm - 4:05 pm Government Track

Credential Theft as a Primary Attack Vector - Detect and Respond to Privileged and Service Account Attacks

Speaker:
Barak Feldman, National Director for the Privileged Account Security Solution Portfolio, CyberArk

Privileged accounts have been at the center of each recent high-profile attack. Moreover, attackers are leveraging privileged credentials as their entry point to high-value systems within the network. This session will explain how hackers that successfully exploit these credentials are able to gain a privileged foothold, allowing them unfettered access to elevate privileges and move about the network freely without detection. With a solid understanding of this well-used method of attack, attendees will learn how to properly secure and manage these powerful credentials. During this session, CyberArk will discuss growing attack trends and what security leaders are doing to protect their organizations from these advanced attacks. CyberArk also will walk through a typical attack that uses privileged accounts and how passwords can be exploited to break down the front door. The session will touch on the growth and prevalence of privileged credentials. We will discuss how to securely store and manage credentials and how to reduce the attack surface - specifically attack surfaces favored by insiders and outsiders with insider credentials. Additionally, this session will review how to detect credential harvesting and blocking future credential-theft attempts, all while maintaining governance and compliance standards.

3:35 pm - 4:05 pm Data Breach Track

Data Security and the Mainframe: Securing All Core Business Applications

Speaker:
Chip Mason, Lead, Mainframe Security Product Management, Broadcom

As data continues to grow and become increasingly regulated, organizations will need an enterprise-wide security strategy that's holistic, covering users as well as data, while also improving their compliance posture. It's easy to think of the mainframe as just another platform in the data center, until you stop and realize that roughly 70 percent of corporate data still resides on the mainframe. That begs serious questions security leaders must ask themselves, such as, "Do you know where on the mainframe that data is, how it's being used, who has access to it, and if all of that data is being handled and stored in a manner compliant with industry legislation and regulations? This session will explore what organizations need to do to strategically and tactically to secure all corporate data, address regulatory compliance requirements, and outline how to stay competitive by securing all core business applications.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

4:10 pm -
4:50 pm
4:10 pm - 4:50 pm

We've Been Breached: Now What? How to Effectively Work with Law Enforcement and Regulators

Speakers:
Kim Peretti, Co-Lead, Cybersecurity Preparedness and Response practice, Alston and Bird, and Former DOJ Cybercrime Prosecutor
Matthew Braverman, Supervisory Special Agent, Washington Field Office, FBI
Richard Bortnick, Cyber Liability and Insurance Attorney, Traub Lieberman Straus & Shrewsberry, LLP
Robert Villanueva, Executive Vice President, Q6 Cyber and Founder of the Cyber Threat Intelligence Division of the US Secret Service

Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts will discuss what well prepared organizations are doing right, when it comes to proactive interaction with law enforcement, information sharing and breach investigation and response.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

4:50 pm -
5:00 pm
4:50 pm - 5:00 pm

Closing / Look Ahead to Day 2

5:00 pm -
6:00 pm
5:00 pm - 6:00 pm

Cocktails and Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:00 am -
8:45 am
8:00 am - 8:45 am

Registration, Breakfast, & Networking

8:45 am -
9:00 am
8:45 am - 9:00 am

Opening Remarks

9:00 am -
9:45 am
9:00 am - 9:45 am

Innovation of Information Sharing

Speaker:
Michael Daniel, President, Cyber Threat Alliance, and Former Cybersecurity Coordinator and Special Assistant to the President

Sharing of cyberthreat information requires new technologies and methods to alert organizations of the mischief emanating from cyberspace that threatens their critical IT assets. Michael Daniel heads the not-for-profit Information Security and Analysis Organization of IT security vendors, and will address the Cyber Security Alliance's information sharing philosophy, its value proposition and how it'll achieve those goals. Enabling technology to automate the sharing of near-real-time contextual cyberthreat information is critical. Such information sharing helps vendors improve their products for customers, enables the longer-term disruption of malicious cyber actors and drives better cybersecurity throughout the digital ecosystem. The presentation also will cover the top things non-cybersecurity organizations must do to improve their IT security.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

9:50 am -
10:35 am
9:50 am - 10:35 am

The Challenges of Securing Critical Infrastructure in the Private Sector

Speaker:
Brian Harrell, Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency

Critical infrastructure protection is an integral part of cyberspace and these assets play a vital role in supporting many of our daily activities, including water and power usage, financial transactions, telecommunications, and so on. Today, the reliability, high performance, continuous operation, and protection of these facilities and systems is a priority in North America. Brian Harrell will explore the various threats and vulnerabilities currently present in the critical infrastructure space and describe protection measures that can be deployed to reduce risk. Brian highlights some of the challenging areas such as governance and security management, mitigations, wide-area situational awareness, and information sharing with government stakeholders.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

10:35 am -
10:45 am
10:35 am - 10:45 am

Exhibiting & Networking Break

10:45 am -
11:15 am
10:45 am - 11:15 am Government Track

Identity Deception and Social Engineering at Work - Email Makes It Easy

Speaker:
Wes Dobry, Principal Security Architect, Agari

Despite the proliferation of social networks and messaging apps, email remains the primary means of communication today. Unfortunately, it also remains a persistent threat vector for cybersecurity abuse. We see these evil emails everywhere: at work, at home and in the news, attempting to sell something, or steal money, an identity, or login information, often with the intent to take you hostage for a hefty ransom.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

10:45 am - 11:15 am Data Breach Track

The Challenge of Operationalizing Threat Intelligence to be Actionable

Speaker:
Brian Soldato, Senior Director of Product Management, NSS Labs

Threat intelligence continues to play an essential role in an enterprise's security efforts. The need for operationalizing threat intelligence is crucial to all business and operational successes. Enterprises need solutions that enable them to harness the power of threat intelligence that is specific to their environment, in order to prevent evolving threats against the organization. Time today is reduced more than ever when it comes to protecting the enterprise. Security operations teams must be able to hastily and effectively interpret threat information into intelligence that can be used to detect threats and to take action protect the enterprise. To truly achieve operationalized threat intelligence, an investment must be into best practices, along with a platform that will enable the organization to completely harness threat intel specific to the organization.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

11:20 am -
12:10 pm
11:20 am - 12:10 pm

Deception Technology: When It Works, It Works. But What about When It Goes Wrong?

Speakers:
Dr. Christopher Pierson, Founder & CEO, BLACKCLOAK
Richard Parry, Principal, Parry Advisory; former Risk Management Executive, JPMorgan Chase
Tom Kellermann, Chief Cybersecurity Officer, Carbon Black

Deception is the most successful strategy in military history. Just as armies used deceit to conquer continents, cyber-deception is being used by more and more organizations to exploit a hacker's greatest weakness - being a human, after all, behind a keyboard. Deception techniques such as honeypots are not a new. But new techniques and capabilities are delivering new approaches to how cyberthreats are dealt with, proactively. During this session, we will deconstruct recent attacks from a hacker's perspective and show how you can use deception technology to detect stealthy attacks, illuminate network blind spots and minimize breach detection time - highlighting the benefits of deception defenses. But what about when these techniques don't work as planned? Can deception technology actually create more problems long-term? We will explore the positives and negatives of deception technology.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

12:10 pm -
1:00 pm
12:10 pm - 1:00 pm

Lunch

1:00 pm -
1:45 pm
1:00 pm - 1:45 pm

Current Trends on Eurasian Cybercrime

Speaker:
Robert Villanueva, Executive Vice President, Q6 Cyber and Founder of the Cyber Threat Intelligence Division of the US Secret Service

Robert Villanueva, assistant special agent in charge (retired), and the founder of the United States Secret Service's Cyber Intelligence Section, in this session will the current rise in the U.S. of data breaches, ransomware, business email compromises, phishing and computer network intrusions. The majority of these cybercrime incidents target U.S. merchants and the financial sector are perpetrated by educated malware writers and highly skilled hackers from Eastern Europe. Right now, many of these miscreants are actually living amongst us in major metropolitan areas in the United States. Villanueva will offer a unique and real-world perspective on financial cybercrime by illustrating specific case examples, local past arrests and highlighting some of their latest tactics/techniques. Additionally, Villanueva will be providing a "live demo" exposing some of these malicious criminal websites that are trafficking in enormous amounts of stolen data from both U.S. and international people and entities.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

1:50 pm -
2:30 pm
1:50 pm - 2:30 pm

Panel: The Evolution of Payments Fraud and the Emerging Threat Landscape

Speakers:
John Buzzard, Fraud Subject Matter Expert, NICE Actimize
Mark Rasch, Principal, Rasch Technology and Cyber Law; former Chief Security Evangelist, Verizon
Randy Vanderhoof, Director, US Payments Forum
Roger Applewhite, Board Member, Electronic Funds Transfer Association & Secure Remote Payments Council

Moderator: Mark Rasch, Principal, Rasch Technology and Cyber Law; Former Chief Security Evangelist, Verizon

As information-security threats intensify, organizations risk becoming disoriented - focused more on grappling with complex technology, an explosion of data, increased regulation and a debilitating skills shortage. The rollout of EMV technology was supposed to fix the problem but has it been effective? Here, our panel of experts will review how the face of payments fraud has changed in the wake of the EMV rollout, and explore what is next on the horizon. Payment fraud spans more than just physical stores; and as more digital channels are used for funds transfers and payments, the channels impacted by payments fraud are expanding. By preparing for the shifting threats posed by hackers and the automated fraud tools they use, organizations can ensure they have the flexibility to withstand unexpected, high-impact security attacks and events. This session will review the top global payments security threats for 2017 and how organizations can prepare for them, as well as how next generation payments systems can be deployed to help minimize these threats.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

2:35 pm -
2:45 pm
2:35 pm - 2:45 pm

Closing Remarks

View Schedule

SPONSORS / Supporting Organizations

Agari
Arbor Networks
CA Technologies
Cyber Ark
NSS Labs
Skybox

LOCATION / Venue & Address

Renaissance Dupont Circle

1143 New Hampshire Ave NW
Washington, DC 20037

Visit Venue Website

Renaissance Dupont Circle

Register Now

WATCH SESSIONS ONLINE

For our premium members, we offer online webinars from all of our past events. Become a member now to get access to keynotes and important sessions from previous events.

Become a Member

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismg.io

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data