ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Fraud & Breach Prevention Summit: New York City

August 08-09, 2017

Watch Past Sessions Online

Speaker

Avivah Litan, VP and Distinguished Analyst, Gartner Research

WELCOME / Letter from the Content Director

Tracy Kitten

Executive Editor, BankInfoSecurity & CUInfoSecurity, ISMG

From ransomware attacks such as WannaCry to increasing threats posed by cyber espionage and international political unrest, 2017 has been anything but dull from a cybersecurity and threat point of view.

Please join us as David Hahn, vice president and CISO at media conglomerate Hearst, and Ed Amoroso, the former senior vice president and CISO at AT&T, kick off our two days with their perspectives about the evolution of cybersecurity, the attacks that are plaguing every industry, and how and
why CISOs must evolve their approaches. These two keynoters will set the
stage for our two days of sessions, panels and networking discussions about
everything from international cyber threats and attack trends to business email compromises, faster payments and payments fraud, and emerging technologies such as deception technology.

We have designed our sessions to address the needs of CISOs, fraud and risk
Teams, security and IT professionals, and many others by tackling real-world
problems and offering solutions that attendees can take back to their offices
and put to use.

Details

New York Marriott Marquis

August 08-09, 2017

$795

View Sessions

Watch This Summit’s Sessions Online
Become a Member

  • Event Gallery

Randy Trzeciak

Insider Threat Research Team Technical Lead, CERT

Tom Kellermann

CEO/Partner, Cyber Ventures; Fmr Chief Cybersecurity Officer, Trend Micro

Avivah Litan

VP and Distinguished Analyst, Gartner Research

David Pollino

Deputy Chief Security Officer, Bank of the West / BNP Paribas

Art Coviello

former CEO, RSA Security; Venture Partner, Rally Ventures

Jay Kramer

former Supervisory Special Agent, Cyber Division, Federal Bureau of Investigation

Jennings Aske

CISO, New York Presbyterian

Ed Amoroso

Founder and CEO, TAG Cyber; former Senior Vice President and CISO, AT&T

FEATURED SPEAKERS / Featured Speakers For Our New York City Summit

Avivah Litan

VP and Distinguished Analyst, Gartner Research

David Pollino

Chief Cybersecurity Officer, Bank of the West (BNP Paribas)

Ed Amoroso

Founder and CEO, TAG Cyber; former Senior Vice President and CISO, AT&T

David Hahn

Vice President and CISO, Hearst

Richard T. Jacobs

Assistant Special Agent in Charge, Cyber Branch, FBI NY

Tim Francis

Vice President and Enterprise Lead for Cyber Insurance, Travelers Business Insurance

Jennings Aske

CISO, New York-Presbyterian

Randy Trzeciak

Director, CERT Insider Threat Center, CMU

Robert Villanueva

Executive Vice President, Q6 Cyber and Founder of the Cyber Threat Intelligence Division of the US Secret Service

Mitch Zahler

CISO, Proactive Cyber Security; formerly Senior Vice President of Cybersecurity, HSBC

Tom Kellermann

Chief Cybersecurity Officer, Carbon Black

Ben Smith

Principal, Sales Engineering and Field CTO, RSA

Benjamin Dean

President, Iconoclast Tech; Fmr Fellow for Cyber Security and Internet Governance, Columbia SIPA

Lisa Sotto

Managing Partner, Chair of Global Privacy and Cybersecurity Practice, Hunton & Williams

Brian Harrell

Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency

Tracy Kitten

Director of Global Events Content and Executive Editor, BankInfoSecurity & CUInfoSecurity

Jay Kramer

Partner, Data Privacy and Cyber Security Practice Group, Lewis Brisbois Bisgaard & Smith; former Supervisory Special Agent, FBI - NY Cyber Division

Paul Bowen

Principal Security Technologist, Arbor Networks

Tom Field

Senior Vice President, Editorial, ISMG

Dr. Christopher Pierson

Founder & CEO, BLACKCLOAK

Scott Ramsey

Managing Director of Cybersecurity and Resiliency Consulting, FIS

Alex Mosher

Vice President of Security Strategy, CA Technologies

Kevin Flynn

Global Director of Products, Skybox Security

Kevin Donovan

Vice President of Sales for the Americas, BioCatch

Sam Elliott

Director of Security Product Management, Bomgar

Paul Bjerke

Vice President, Fraud and Identity Strategy, LexisNexis

Richard Bortnick

Cyber Liability and Insurance Attorney, Traub Lieberman Straus & Shrewsberry, LLP

David McNeely

Chief Strategy Officer, Centrify

Mike Fowler

Vice President, Professional Services, DF Labs

Avi Rembaum

Vice President of Security Solutions, Check Point Software Technologies

Noam Jolles

Senior Intelligence Specialist, Diskin Advanced Technologies

Jackie Castelli

Senior Product Manager, CrowdStrike

John Gunn

Chief Marketing Officer, OneSpan

Brian Soldato

Senior Director of Product Management, NSS Labs

Josh Brooks

Director of Compliance Engineering, Oracle

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Schedule / Session Date & Times



  • Tuesday, August 8th

  • Wednesday, August 9th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:00 am -
8:45 am
8:00 am - 8:45 am

Registration, Breakfast & Exhibit Browsing

8:45 am -
9:00 am
8:45 am - 9:00 am

Opening Remarks

9:00 am -
10:00 am
9:00 am - 10:00 am

The Growing Dangers of Interconnectedness and Its Adverse Impact on Availability, Reliability and Reputation

Speaker:
David Hahn, Vice President and CISO, Hearst

When an attack strikes, the first task on-hand for anyone working in cybersecurity is to stop the disruption; the second task is to ensure that critical data is protected. And for Fortune 500 companies and other leading U.S. businesses like Hearst Corp. - a media and business information conglomerate with ownership of and in publications such as Cosmopolitan and Esquire and television networks like A&E and ESPN - the complexities of size pose significant challenges. In this keynote address, David Hahn, the vice president and CISO at Hearst, will review how the evolution of so-called interconnectedness is impacting today's businesses, and what interconnectedness will mean for the future, especially at organizations like Hearst.

During a cybersecurity career spanning nearly three decades with one of the largest banking institutions in the country - Wells Fargo - and one of the largest media and business information conglomerates - Hearst, Hahn has seen adversaries ranging from curious 'tinkers' to nation states. Their motives span from simple revenge to financial gains and the damage they cause is often catastrophic, due to system compromises from an organization's inability to meet its mission and customer loss of trust in its brand.

Protecting an organization's assets, brand and intellectual property in this interconnected world is a challenging task for any information security professional. Listen to an industry veteran discuss his own experiences within the financial-services industry, a highly regulated sector, to a private conglomerate, where recent malware/ransomware, denial/disruption of service attacks (DDoS) attacks and malvertising have and will dictate the future of cybersecurity for years to come.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

10:05 am -
10:35 am
10:05 am - 10:35 am Fraud Track

The Route to Trusted Identity

Speaker:
Paul Bjerke, Vice President, Fraud and Identity Strategy, LexisNexis

Synthetic ID fraud is a fast-growing, multibillion dollar issue. Often misclassified as a credit loss, synthetic ID fraud is now affecting an expanding list of entities. Also, unless extremely large, this "victimless" crime often does not get the full attention of law enforcement. From the LexisNexis data labs, learn about the latest proof-of-life research results, how the fraudsters are perpetuating these crimes and a layered risk management approach to help identify fraud applications. Hint: KBA does not work.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

10:05 am - 10:35 am Incident Response Track

The Rise of Cybercrime as a Service: Which Threats Should We Address First?

Speaker:
Kevin Flynn, Global Director of Products, Skybox Security

Monetarily motivated attacks are by far the most prevalent cyberthreats to organizations worldwide, yet vulnerability management techniques have largely failed to adapt to a threat landscape dominated by distributed crimeware. By understanding the commercialization of attack tools and services - particularly the vulnerabilities they use, re-use and share - vulnerability management can focus on the small subset of vulnerabilities that are exploited in the wild and packaged in distributed crimeware. This threat-centric approach improves vulnerability prioritization and focuses remediation on the relatively small number of exploitable vulnerabilities, greatly reducing risk through efficient, intelligent processes. This session will cover what's been driving the shift to distributed cybercrime, how to align vulnerability management with real-world threat behavior, and what intelligence and tools are needed.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

10:05 am - 10:35 am Data Breach Track

Digital Crime and Cybersecurity

Speaker:
Scott Ramsey, Managing Director of Cybersecurity and Resiliency Consulting, FIS

The Internet-of-Things poses tremendous cybercrime challenges with crafting a meaningful risk-based financial crime management strategy. In this session, we'll cover the meaning of cybersecurity in the context of fraud and customer trust, an understanding on the meaning and purpose of a cyber threat intelligence program, when, where, and how to use anomalous behavior analytics, assessing the technical risks vendors pose and emerging endpoint protection products requirements.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

10:35 am -
10:55 am
10:35 am - 10:55 am

Exhibiting & Networking Break

10:55 am -
11:40 am
10:55 am - 11:40 am

In the Wake of WannaCry: Creating a Data Security Action Plan that Addresses the Core Elements

Speakers:
David Pollino, Chief Cybersecurity Officer, Bank of the West (BNP Paribas)
Eric Chabrow, Retired Executive Editor, GovInfoSecurity
Jennings Aske, CISO, New York-Presbyterian
Mitch Zahler, CISO, Proactive Cyber Security; formerly Senior Vice President of Cybersecurity, HSBC

In the wake of recent ransomware attacks, such as WannaCry, what lessons do we have yet to learn? Ransomware attacks are nothing new, and while WannaCry was widespread, it was not sophisticated or stealthy, necessarily. So why did it have such an impact?

In this session, our panelists will discuss why the "wartime mindset" has yet to be embraced, and why CISOs need to take charge and lead the way toward developing more effective security action plans.

Experienced CISOs and legal experts will:

  • Provide real-world insights into how to create an effective cybersecurity action plan;
  • Spell out the core elements of breach prevention, detection and response strategies; and
  • Identify security technologies that can play an effective role in supporting a so-called "wartime" strategy

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

11:40 am -
12:25 pm
11:40 am - 12:25 pm

Speed Networking with Presenters and Peers

One of the most valuable ways to learn is through interaction with your peers. Our “Speed Networking” session will provide an opportunity to meet practitioners who have similar challenges in the areas of fraud and breach prevention, and discuss solutions to potential obstacles. Mingle, share and learn in this unique, rapid-fire and interactive environment.

12:25 pm -
1:15 pm
12:25 pm - 1:15 pm

Lunch

1:15 pm -
1:45 pm
1:15 pm - 1:45 pm Fraud Track

Business-Driven Security: Bridging the Gap between Security and 'The Business'

Speaker:
Ben Smith, Principal, Sales Engineering and Field CTO, RSA

Organizations of all sizes today face serious and consequential risk-management challenges. Technology is often presented as the ultimate solution to this problem, but in many cases, organizations are experiencing not just a technical challenge, but a "language" challenge, especially when it comes to risk-management communication between various levels of the organization. Ultimately, our goal is to provide trusted, transparent and aggregated risk data in order to drive more informed, confident and effective business decisions. Join RSA, a Dell Technologies business, to discuss these challenges and, more importantly, potential solutions to consider.

1:15 pm - 1:45 pm Incident Response Track

PAM and Secure Code: Gaining an Inside and Outside View of Applications

Speaker:
Alex Mosher, Vice President of Security Strategy, CA Technologies

Many organizations are undergoing a transformation to support digital platforms and stay competitive; but in order to maintain security, they have to ensure that access to these platforms is limited and that security remains a priority. New vulnerabilities to cybercrime are being introduced through hybrid environments, ones that often include remote access to systems and servers, automation of processes, and concentration of administrative power. Limiting administrative power through privileged access management is increasingly critical, but so is authentication, as more legitimate users' credentials are being compromised and access to systems is being fooled by the coders. According to the 2017 Verizon Data Breach Investigations Report, today's breaches involve a "combination of human factors, hardware devices, exploited configurations or malicious software." How can these risks be mitigated while still keeping a competitive edge? This session will explore how taking a proactive stance can help mitigate risks, while still enabling the business to use tools that are necessary in today's digitally charged economy.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

1:50 pm -
2:20 pm
1:50 pm - 2:20 pm

The Impact of New York's New Cyber Regulations: Don't Let the Sunrise of Regulatory Mandates Catch You Sleeping

Speaker:
Paul Bowen, Principal Security Technologist, Arbor Networks

The pressure is on for all industries to upgrade their cyber-protection policies. New York is the first state to initiate a 180-day grace period for all financial services companies to upgrade both cyber policies and protection. As New York's new cyber mandates roll out, other states and industries will likely follow. During this session, Arbor Networks' Principal Security Technologist Paul Bowen will outline the impact of these new regulations, and provide an incident response framework that helps with compliance and preventing an inevitable compromise from turning into a breach.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

2:20 pm -
2:35 pm
2:20 pm - 2:35 pm

Exhibiting & Networking Break

2:35 pm -
3:05 pm
2:35 pm - 3:05 pm Fraud Track

Faster Payment, Faster Fraud

Speaker:
Kevin Donovan, Vice President of Sales for the Americas, BioCatch

Following NACHA's new rule for same-day ACH transactions, businesses and consumers are now able to benefit from same-day transaction processing, providing quicker access to payroll, account transactions and more. While beneficial for businesses and consumers, same-day ACH has necessitated that financial institutions review thousands of additional transactions per day, leading to a significant increase in staff and operational costs along with an increased potential for fraudulent activity because of the sheer volume and rapidness of review. This session analyzes the United Kingdom's transition to faster payments, which saw banking fraud volumes triple, and discusses what U.S. banks can learn from the U.K.'s example. It also reviews the types of fraud that have emerged from the move to instant transfer of funds as well as what strategies have been successful in stopping cybercriminals.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

2:35 pm - 3:05 pm Incident Response Track

2:35 pm - 3:05 pm Data Breach Track

Security Threats vs. Unmitigated Risks

Speaker:
Brian Soldato, Senior Director of Product Management, NSS Labs

Enterprises have invested extensively to address the evolving threat landscape, but security effectiveness remains a guessing game. The problem is, enterprise security teams cannot be sure of the effectiveness of their security controls once they are in place. At the same time, they are under pressure to quantify their cyber risks. In this session, we will explore how to address security effectiveness, quantify risk and deliver peace of mind to key stakeholders.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

3:10 pm -
4:00 pm
3:10 pm - 4:00 pm

Moving from Indicators of Compromise to Indicators of Attackers: But Will Attacker Attribution Really Help Us?

Speakers:
Avivah Litan, VP and Distinguished Analyst, Gartner Research
Jackie Castelli, Senior Product Manager, CrowdStrike
Noam Jolles, Senior Intelligence Specialist, Diskin Advanced Technologies
Richard T. Jacobs, Assistant Special Agent in Charge, Cyber Branch, FBI NY

How does attacker attribution help a CISO and an enterprise? The answer: More than most might think. Most organizations don't care who the attacker is. They just want to stave off attacks. But could they do more?

By using indicators of compromise, for instance, organizations can strengthen their defenses. IOCs are basically just signatures of cyber-weapons used during attacks. They are not indicators of who the attackers are. But by creating 'indicators of attacker compromise' (IOAC), the attack attributes of one cyber-gang linked to multiple types of attacks quickly become very useful. If one attack group is linked to banking Trojans and cyberespionage against employee email accounts, for instance, then identifying the methods used can benefit organizations that are targeted by that same group in the future. So instead of just relying on multiple, somewhat-redundant IOCs across attack target types, organizations also can benefit from a single IOAC, which should be predictive of future unseen attacks. In this discussion about attribution and the role IOCs and IOACs play, moderator Garter Vice President and Distinguished Analyst Avivah Litan will question our panel of experts about the future of attribution, and why it is becoming more critical for organizations across numerous sectors.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

4:05 pm -
4:45 pm
4:05 pm - 4:45 pm

We've Been Breached: Now What? How to Effectively Work with Law Enforcement and Regulators

Speakers:
Brian Harrell, Assistant Director for Infrastructure Security, U.S. Cybersecurity and Infrastructure Security Agency
David Pollino, Chief Cybersecurity Officer, Bank of the West (BNP Paribas)
Jay Kramer, Partner, Data Privacy and Cyber Security Practice Group, Lewis Brisbois Bisgaard & Smith; former Supervisory Special Agent, FBI - NY Cyber Division
Lisa Sotto, Managing Partner, Chair of Global Privacy and Cybersecurity Practice, Hunton & Williams

Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts will discuss what well prepared organizations are doing right, when it comes to proactive interaction with law enforcement, information sharing and breach investigation and response.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

4:45 pm -
5:00 pm
4:45 pm - 5:00 pm

Closing Remarks / Look Ahead to Day 2

5:00 pm -
6:00 pm
5:00 pm - 6:00 pm

Cocktails & Networking

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
8:00 am -
8:45 am
8:00 am - 8:45 am

Registration, Breakfast, & Networking

8:45 am -
9:00 am
8:45 am - 9:00 am

Opening Remarks

9:00 am -
10:00 am
9:00 am - 10:00 am

A Random Walk through Cybersecurity: How Hacking Will Impact Politics, Policies and Business Today and Into the Future

Speaker:
Ed Amoroso, Founder and CEO, TAG Cyber; former Senior Vice President and CISO, AT&T

In the wake of Russian hacks and attempted attacks against political groups and parties throughout the world, such as the attack against the U.S.'s Democratic National Committee, we have to ask ourselves how cybersecurity, or a lack thereof, will impact politics, policies and businesses in the years to come. Attacks waged by rogue governments and nation-states are nothing new. But as the lines continually blur between cybercriminals and those who wage cyber espionage attacks, it's become increasingly critical for public - and private-sector entities to not only change how they defend themselves against cyberattacks, but also how they look for cyberattacks and evaluate their purpose. This session addresses how cybersecurity should be addressed to ensure protection of critical infrastructure.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

10:00 am -
11:00 am
10:00 am - 11:00 am

Insider Threat Detection: Lessons from the Trenches Based on Real Insider Cases

Speakers:
David Pollino, Chief Cybersecurity Officer, Bank of the West (BNP Paribas)
Randy Trzeciak, Director, CERT Insider Threat Center, CMU

What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misconception allows another significant threat to your organization's critical assets to stay completely under the radar - the threat of malicious and non-malicious insiders. With so much of an organization's valuable information digitized today, it may be possible that an insider can steal your information or expose it unintentionally without you knowing it.

In this interactive session with the audience, we will explore:

  • Some of the startling results of meticulous analysis of hundreds of real-life insider attacks;
  • Some potential technical and behavioral insider threat risk indicators;
  • Which new technologies enable the detection of anomalous behavior patterns often before an insider incident occurs; and
  • The five steps companies need to take in order to develop an effective Insider Threat Detection Program.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

11:00 am -
11:20 am
11:00 am - 11:20 am

Exhibiting & Networking Break

11:20 am -
11:50 am
11:20 am - 11:50 am Fraud Track

Six Steps to Secure Access for Privileged Insiders and Vendors

Speaker:
Sam Elliott, Director of Security Product Management, Bomgar

Many organizations trying to secure privileged access for employees or vendors focus solely on the privileged credentials or identities. But that's only half the battle. Securing the access pathways is just as critical to protecting your critical systems and data from cyberthreats. This session outlines the six steps companies need to take to secure privileged access, while simultaneously improving business productivity.

11:20 am - 11:50 am Incident Response Track

Shedding Light on the Dark Web

Speaker:
Avi Rembaum, Vice President of Security Solutions, Check Point Software Technologies

The dark web is quickly evolving into a marketplace of information and tools that hackers and adversaries use to breach company networks. The question we face as an industry is how to leverage an awareness of information for sale on the dark web to improve corporate security architectures. This session showcase real-world examples of data on the dark web and suggest pragmatic tips to mitigate future attacks and risks.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

11:20 am - 11:50 am Data Breach Track

Moving to Hybrid Cloud? It's Time to Re-Think Security to Prevent Data Breach

Speaker:
David McNeely, Chief Strategy Officer, Centrify

Are you moving your applications to the Cloud or have a Cloud First Strategy? Most recent data breaches have focused on user accounts and privileged access to sensitive resources, both in the data center and in the cloud. While you are migrating to cloud platforms, now is the time to re-think security. In this session, we will explore proven best practices for protecting identities and privileged access across data centers and cloud-based services.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

11:55 am -
12:25 pm
11:55 am - 12:25 pm Fraud Track

2017 Faces of Fraud: Mobile Exploits Come of Age

Speaker:
John Gunn, Chief Marketing Officer, OneSpan

Defending against tomorrow's mobile attacks is a moving target. But new technologies and strategies, including behavioral biometrics and machine learning-based analytics, are allowing financial institutions to reduce their fraud losses while enhancing their customer experience. This session explores today's threat landscape and provides best practices for reducing mobile fraud through the use of zero-friction authentication. Building on results gathered for ISMG's 2017 Faces of Fraud Survey: Mobile Exploits Come of Age, this session reviews new forms of fraud being used to attack mobile channels and offers advice on what can be done to counter these latest attacks. You'll learn what organizations should be doing to build trust, expand the services they offer through mobile channels and ensure customers have continuously positive experiences.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

11:55 am - 12:25 pm Incident Response Track

Security Breaches: Identification and Prevention Measures

Speaker:
Josh Brooks, Director of Compliance Engineering, Oracle

The first half of 2017 has already seen an inordinate volume of cybersecurity breaches and incidents, from stolen state secrets to globally deployed ransomware and sensitive customer data leakage. It is imperative that businesses and government agencies alike know how to protect their assets and sensitive data, implement appropriate protective controls, and quickly identify security breaches when they occur.

This session will provide guidance about how to:

  • Establish preventative measures and controls to protect proprietary and sensitive data;
  • Identify and classify cybersecurity breaches;
  • Differentiate breaches from incidents; and
  • Enable governance, risk and compliance programs to assist with all the above.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

12:25 pm -
1:15 pm
12:25 pm - 1:15 pm

Lunch

1:15 pm -
1:55 pm
1:15 pm - 1:55 pm

Current Trends on Eurasian Cybercrime

Speaker:
Robert Villanueva, Executive Vice President, Q6 Cyber and Founder of the Cyber Threat Intelligence Division of the US Secret Service

Robert Villanueva, assistant special agent in charge (retired), and the founder of the United States Secret Service's Cyber Intelligence Section, in this session will the current rise in the U.S. of data breaches, ransomware, business email compromises, phishing and computer network intrusions. The majority of these cybercrime incidents target U.S. merchants and the financial sector are perpetrated by educated malware writers and highly skilled hackers from Eastern Europe. Right now, many of these miscreants are actually living amongst us in major metropolitan areas in the United States. Villanueva will offer a unique and real-world perspective on financial cybercrime by illustrating specific case examples, local past arrests and highlighting some of their latest tactics/techniques. Additionally, Villanueva will be providing a "live demo" exposing some of these malicious criminal websites that are trafficking in enormous amounts of stolen data from both U.S. and international people and entities.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

2:00 pm -
3:00 pm
2:00 pm - 3:00 pm

Cyber Insurance: A Rising Role in Mitigating Risk for CISOs

Speakers:
Benjamin Dean, President, Iconoclast Tech; Fmr Fellow for Cyber Security and Internet Governance, Columbia SIPA
David Pollino, Chief Cybersecurity Officer, Bank of the West (BNP Paribas)
Jay Kramer, Partner, Data Privacy and Cyber Security Practice Group, Lewis Brisbois Bisgaard & Smith; former Supervisory Special Agent, FBI - NY Cyber Division
Richard Bortnick, Cyber Liability and Insurance Attorney, Traub Lieberman Straus & Shrewsberry, LLP
Tim Francis, Vice President and Enterprise Lead for Cyber Insurance, Travelers Business Insurance

The financial risks to organizations from data breaches come from a variety of angles, from share price hits to class-action lawsuits to fines from regulators to reputational damage. As such, the insurance industry has jumped full steam into cyber. Larger insurers are already helping companies spot and mitigate weaknesses as part of their coverage, as well as helping post-incident with response and remediation. But how often are CISOs involved in the cyber-insurance decision-making process? Not often enough.

In this engaging panel discussion about the role cyber-insurance plays today in every line of business, Tim Francis, vice president and enterprise lead for cyber insurance at Travelers, will kick us off with a 10-minute overview of the current state of affairs, highlighting why it's so critical to get CISOs involved in cyber-insurance decisions from Day 1. CISOs have historically not been too keen to see money invested in risk-transfer protections; instead, they'd rather see that money spent on security. So, how and should their perspectives about cyber-insurance change? After Tim's presentation, we will move to into a panel discussion to further explore questions and views on cyber insurance.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

3:00 pm -
3:40 pm
3:00 pm - 3:40 pm

Deception Technology: When It Works, It Works. But What about When It Goes Wrong?

Speakers:
Dr. Christopher Pierson, Founder & CEO, BLACKCLOAK
David Pollino, Chief Cybersecurity Officer, Bank of the West (BNP Paribas)
Tom Field, Senior Vice President, Editorial, ISMG
Tom Kellermann, Chief Cybersecurity Officer, Carbon Black

Deception is the most successful strategy in military history. Just as armies used deceit to conquer continents, cyber-deception is being used by more and more organizations to exploit a hacker's greatest weakness - being a human, after all, behind a keyboard. Deception techniques such as honeypots are not a new. But new techniques and capabilities are delivering new approaches to how cyberthreats are dealt with, proactively. During this session, we will deconstruct recent attacks from a hacker's perspective and show how you can use deception technology to detect stealthy attacks, illuminate network blind spots and minimize breach detection time - highlighting the benefits of deception defenses. But what about when these techniques don't work as planned? Can deception technology actually create more problems long-term? We will explore the positives and negatives of deception technology.

Additional Summit Insight:
Hear from more industry influencers, earn CPE credits, and network with leaders of technology at our global events. Learn more at our Fraud & Breach Prevention Events site.

3:40 pm -
3:45 pm
3:40 pm - 3:45 pm

Closing Remarks

View Schedule

SPONSORS / Supporting Organizations

Arbor Networks
Attivo Networks
Biocatch
bitglass
CA Technologies
Cyber Ark
Darktrace
DF Labs
FireEye
FIS
IBM
InAuth
Information Security Forum (ISF)
Ixia
LastPass
LexisNexis
NSS Labs
RSA
Rsam
Skybox
Tata Communications
Thycotic

LOCATION / Venue & Address

New York Marriott Marquis

1535 Broadway
New York, New York 10036

Visit Venue Website

Location TBA

Register Now

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Register Now

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismgcorp.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data